>>> > Does anybody know more about this "security flaw in the open-source Linux
>>> > GNU C Library"
>>> >
>>> > http://www.theglobeandmail.com/technology/linux-makers-release-patch-to-thwart-new-ghost-cyber-threat/article22662060/?cmpid=rss1
>>>
>>>
>>> I updated a system of mine that was using an old version of glibc and
>>> rebooted.  I can't do a full emerge world there or use various other
>>> portage tools due to the peculiarities of my current situation.  Could
>>> I still be vulnerable?
>>
>> Your system may be vulnerable to this issue only if you have
>> packages statically linked with vulnerable glibc libs, so most
>> likely — no. But your system may be affected by a plenty of other
>> issues in various packages.
>>
>> At the very least you should apply all GLSAs to your system: while
>> they don't encompass all vulnerabilities, they should warn you
>> about most common and important ones.
>
>
> I don't think I have USE=static anywhere.  Any way to confirm?
>
> I've been watching glsa.gentoo.org (a little dismayed that this glibc
> vulnerability isn't there yet) but you prompted me to give glsa-check
> a try.  It's telling me I'm vulnerable to some that I clearly am not
> vulnerable to.  Do I need to clear a cache somewhere?


glsa-check is working fine, it was a slotted issue.  Still curious
about a way to check for statically linked packages.

- Grant

Reply via email to