Date: Wed, 28 Jan 2015 14:52:47 -0500 From: Jerry <jerry@seibercom.net> To: User questions <freebsd-questions@freebsd.org> Subject: Linux "Ghost" Remote Code Execution Vulnerability Message-ID: <20150128145247.5086e9a4@scorpio>
next in thread | raw e-mail | index | archive | help
--Sig_/XcfEeRY9E2_v9pX/jQsocY3 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Does this vulnerability affect FreeBSD? https://www.us-cert.gov/ncas/current-activity/2015/01/27/Linux-Ghost-Remote= -Code-Execution-Vulnerability --=20 Jerry --Sig_/XcfEeRY9E2_v9pX/jQsocY3 Content-Type: application/pgp-signature Content-Description: OpenPGP digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCAAGBQJUyT4PAAoJEElTsHIJnX8efRcH+wTl8H211Ni47wUBdOq8wtso jOmo3Rw2I5lGrXEaKAaEdaYUEdgkC0V+xvurLwmRFiQvVBY6GHW7/WGEDWfMUGY6 bxvypDhOdFTfRV1PxAZK5jnALlcHjIh9vAWTJaANWJbiXOt9Oqw3Gq5tNkj49Nxf HmZ3V5/IiAVlhShnopfj/HBSbLgxzT0ZSs+BsMbqneM/xKioWa95uOBqrgk7mH7t OqG92/oic3r2pNsRItDTCoCjk4pKPoAsCPzGzlqi9BVo8yst7+fYDOn9hzeXX5I6 llRSr/3j9POPj+PPG+tkssdC2/zEVH5XcWYm/vV/a7JAWGv1GJEKaIsTL84Qj0w= =Qt3X -----END PGP SIGNATURE----- --Sig_/XcfEeRY9E2_v9pX/jQsocY3--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20150128145247.5086e9a4>