16th February 2016
|
Administrator
|
|
Join Date: May 2008
Location: Budel - the Netherlands
Posts: 4,131
|
|
Serious glibc, the GNU C library, vulnerability
From https://threatpost.com/critical-glib...t-risk/116261/
Quote:
The flaw, CVE-2015-7547, is a stack-based buffer overflow in the glibc DNS client-side resolver that puts Linux machines at risk for remote code execution. The flaw is triggered when the getaddrinfo() library function is used, Google said today in its advisory.
|
More details can be found at http://arstechnica.com/security/2016...es-vulnerable/
__________________
You don't need to be a genius to debug a pf.conf firewall ruleset, you just need the guts to run tcpdump
|