before considering downtimes and patching activities on production servers
read these:

https://www.debian.org/security/2015/dsa-3142
http://seclists.org/oss-sec/2015/q1/283

especially the second link mention network-facing software which is not
vulnerable due to proper sanitization out of glibc.

On Wed, Jan 28, 2015 at 1:20 PM, <i...@thargoid.co.uk> wrote:

> Hey all,
>
>   For those that do not know about this yet, seems that glibc has a nasty
> bug in it that should probably be patched. Wheezy and squeeze vulnerable,
> but all you bleeding edge folk should be ok as Jessie and sid seems fine
>
> https://security-tracker.debian.org/tracker/CVE-2015-0235
>
> Cheers
>
> Iain
>
>
> --
> To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a
> subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
> Archive: https://lists.debian.org/28f1fa682337d21078d8c83d9c9e03
> a...@thargoid.co.uk
>
>

Reply via email to