before considering downtimes and patching activities on production servers read these:
https://www.debian.org/security/2015/dsa-3142 http://seclists.org/oss-sec/2015/q1/283 especially the second link mention network-facing software which is not vulnerable due to proper sanitization out of glibc. On Wed, Jan 28, 2015 at 1:20 PM, <i...@thargoid.co.uk> wrote: > Hey all, > > For those that do not know about this yet, seems that glibc has a nasty > bug in it that should probably be patched. Wheezy and squeeze vulnerable, > but all you bleeding edge folk should be ok as Jessie and sid seems fine > > https://security-tracker.debian.org/tracker/CVE-2015-0235 > > Cheers > > Iain > > > -- > To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a > subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org > Archive: https://lists.debian.org/28f1fa682337d21078d8c83d9c9e03 > a...@thargoid.co.uk > >