On 29 January 2015 at 02:17, Tim ignored_mail...@yahoo.com.au wrote:
Allegedly, on or about 28 January 2015, Doug sent:
... A remote attacker able to call either of these functions could
exploit the flaw to execute arbitrary code with the permissions of the
user running the application
Hi,
Can someone describe in detail about the Ghost security hole. And is there any
patch or a solution to fix it?
Thanks,
Norah Jones
--
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
On Wed, 28 Jan 2015 14:21:41 + Norah Jones wrote:
Hi,
Can someone describe in detail about the Ghost security hole. And is there
any patch or a solution to fix it?
You should read
https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability
--Frank
On 01/28/2015 09:21 AM, Norah Jones wrote:
Hi,
Can someone describe in detail about the Ghost security hole. And is there any
patch or a solution to fix it?
Thanks,
Norah Jones
The following is repeated verbatim from the PCLinuxOS Forum:
(Posted by jzakiya)
glibc vulnerbility
« on:
On Wed, 2015-01-28 at 13:24 -0500, Kevin Cummings wrote:
On 01/28/2015 01:19 PM, Matthew Miller wrote:
On Wed, Jan 28, 2015 at 02:21:41PM +, Norah Jones wrote:
Can someone describe in detail about the Ghost security hole. And is
there any patch or a solution to fix it?
This was a
On 01/28/2015 12:29 PM, Patrick O'Callaghan wrote:
Even though you fixed this yourself, F19 has already been EOLed and will
therefore not receive even critical security updates such as this one.
That's why it's important for people to stay current with the supported
versions, or switch to a
On 01/28/2015 07:17 PM, Tim wrote:
Allegedly, on or about 28 January 2015, Doug sent:
... A remote attacker able to call either of these functions could
exploit the flaw to execute arbitrary code with the permissions of the
user running the application
All these security flaws come with
Allegedly, on or about 28 January 2015, Doug sent:
... A remote attacker able to call either of these functions could
exploit the flaw to execute arbitrary code with the permissions of the
user running the application
All these security flaws come with the usual flaw allows escalation of
On Wed, Jan 28, 2015 at 02:21:41PM +, Norah Jones wrote:
Can someone describe in detail about the Ghost security hole. And is
there any patch or a solution to fix it?
This was a problem fixed in glibc 2.18, so that version, as shipped in
F20, and 2.20, as we have in F21, are not vulnerable.
On 01/28/2015 01:19 PM, Matthew Miller wrote:
On Wed, Jan 28, 2015 at 02:21:41PM +, Norah Jones wrote:
Can someone describe in detail about the Ghost security hole. And is
there any patch or a solution to fix it?
This was a problem fixed in glibc 2.18, so that version, as shipped in
10 matches
Mail list logo