<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=windows-1252">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Sorry for the crosspost - Daniel beat me to the punch on this, I
    became aware of this today and it really is quite a biggie; get
    patching!<br>
    <br>
    A fairly human-readable comment on this vulnerability can be found
    at Qualys:<br>
    <br>
<a class="moz-txt-link-freetext" href="https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability">https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability</a><br>
    <br>
    And a good technical description:<br>
    <br>
<a class="moz-txt-link-freetext" href="http://ma.ttias.be/critical-glibc-update-cve-2015-0235-gethostbyname-calls/">http://ma.ttias.be/critical-glibc-update-cve-2015-0235-gethostbyname-calls/</a><br>
    <br>
    Mark.<br>
    <div class="moz-forward-container"><br>
      <br>
      -------- Forwarded Message --------
      <table class="moz-email-headers-table" border="0" cellpadding="0"
        cellspacing="0">
        <tbody>
          <tr>
            <th align="RIGHT" nowrap="nowrap" valign="BASELINE">Subject:
            </th>
            <td>[NZOSS-Openchat] Vulnerability alert: GHOST - glibc
              gethostbyname buffer overflow</td>
          </tr>
          <tr>
            <th align="RIGHT" nowrap="nowrap" valign="BASELINE">Date: </th>
            <td>Wed, 28 Jan 2015 12:58:35 +1300</td>
          </tr>
          <tr>
            <th align="RIGHT" nowrap="nowrap" valign="BASELINE">From: </th>
            <td>Daniel Reurich <a class="moz-txt-link-rfc2396E" href="mailto:daniel@centurion.net.nz"><daniel@centurion.net.nz></a></td>
          </tr>
          <tr>
            <th align="RIGHT" nowrap="nowrap" valign="BASELINE">Reply-To:
            </th>
            <td>NZOSS Open Discussion List
              <a class="moz-txt-link-rfc2396E" href="mailto:openchat@lists.nzoss.org.nz"><openchat@lists.nzoss.org.nz></a></td>
          </tr>
          <tr>
            <th align="RIGHT" nowrap="nowrap" valign="BASELINE">To: </th>
            <td>NZOSS Open Discussion List
              <a class="moz-txt-link-rfc2396E" href="mailto:openchat@lists.nzoss.org.nz"><openchat@lists.nzoss.org.nz></a></td>
          </tr>
        </tbody>
      </table>
      <br>
      <br>
      <pre>This is a fairly serious bug effecting glibc versions prior to glibc 
2.18.  In particular current Stable and Long Term Service Releases such 
as Debian Wheezy, Red Hat Enterprise and CentOS vs 5, 6 & 7 etc are 
known to be vulnerable.

Please check your distrobution for updates.  Debian Wheezy has a 
security update, and Jessie/Sid have new packages with the fix.

Details of the specifics can be found here:
<a class="moz-txt-link-freetext" href="http://www.openwall.com/lists/oss-security/2015/01/27/9">http://www.openwall.com/lists/oss-security/2015/01/27/9</a>



-- 
Daniel Reurich
Centurion Computer Technology (2005) Ltd.
021 797 722
_______________________________________________
Openchat mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Openchat@lists.nzoss.org.nz">Openchat@lists.nzoss.org.nz</a>
<a class="moz-txt-link-freetext" href="http://lists.nzoss.org.nz/mailman/listinfo/openchat">http://lists.nzoss.org.nz/mailman/listinfo/openchat</a>
</pre>
      <br>
    </div>
    <br>
  </body>
</html>