[ale] glibc vulnerability
Jim Kinney
jim.kinney at gmail.com
Tue Jan 27 17:57:25 EST 2015
On Tue, 2015-01-27 at 16:33 -0500, James Sumners wrote:
> It's just getting ridiculous at this point.
Actually, no. It's about time that some of the core capabilities of
Linux were put under the security microscope. This particular issue
doesn't allow a root access but does allow access as the user running a
vulnerable process. So turn on selinux while this is getting patched and
privilege escalations are mostly moot.
>
> On Tue, Jan 27, 2015 at 3:34 PM, Beddingfield, Allen <allen at ua.edu>
> wrote:
> FYI, for those who have not already seen this...
> Get ready for another round of emergency patches:
> http://ma.ttias.be/critical-glibc-update-cve-2015-0235-gethostbyname-calls/
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo
>
--
James P. Kinney III
Every time you stop a school, you will have to build a jail. What you
gain at one end you lose at the other. It's like feeding a dog on his
own tail. It won't fatten the dog.
- Speech 11/23/1900 Mark Twain
http://heretothereideas.blogspot.com/
More information about the Ale
mailing list