-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

FWIW, in the original advisory at [1], section 4, there is a snippet
of C you can use to test whether you are vulnerable. If you are, you
should probably upgrade asap. The fact that no exploit for a specific
program has been found is no final proof there is none, although I
don’t doubt that Qualys took great effort in finding exploits
(considering the detail of their advisory, which reads really great).

In the follow-up [2] they state by the way that they also looked at
postfix.

best regards,
jwi

   [1]: http://www.openwall.com/lists/oss-security/2015/01/27/9
   [2]: http://www.openwall.com/lists/oss-security/2015/01/27/18

On 28.01.2015 06:17, Vijay Rajah wrote:
> Hello,
> 
> I'm sure most of you are aware of the latest Glibc vulnerability.
> (FYI: http://www.openwall.com/lists/oss-security/2015/01/27/9)
> 
> I'm not sure If postfix is vulnerable. I see from that posting
> that, exim under certain configurations, is vulnerable.
> 
> I think since postfix supports IPV6, it would use the
> getaddrinfo() function. Is there any place where the older
> getbyhostname() function is still used?
> 
> Is postfix in any way at all, vulnerable to this bug?
> 
> -Thanks Vijay
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=LUab
-----END PGP SIGNATURE-----

Reply via email to