[tor-relays] GHOST: glibc gethostbyname buffer overflow

goll goll at kset.org
Wed Jan 28 08:47:31 UTC 2015


Hello operators,

If you have not done so already, update your glibc:

"as a result, most stable and long-term-support distributions were left
exposed (and still are): Debian 7 (wheezy), Red Hat Enterprise Linux 6
& 7, CentOS 6 & 7, Ubuntu 12.04, for example."

http://www.openwall.com/lists/oss-security/2015/01/27/9

Best regards
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20150128/680cc932/attachment.sig>


More information about the tor-relays mailing list