I've just begun working with Zen Community edition. I notice that the ISO
is based on Debian 6.0, which Debian.org considers an obsolete stable
edition.
In light of the recently disclosed GHOST vulnerability in glibc (
https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability),
I've applied the available Debian 6 updates and tested, but the glibc
version is still vulnerable. I suspect that closing this vulnerability
would require upgrading to the current stable version of Debian, 7.0.
Has anyone done this? Or are you addressing the ghost vulnerability in
glibc in some other way?
--
Mike Watson
WMC Information Services
m <[email protected]>[email protected]
307-577-2028
------------------------------------------------------------------------------
Dive into the World of Parallel Programming. The Go Parallel Website,
sponsored by Intel and developed in partnership with Slashdot Media, is your
hub for all things parallel software development, from weekly thought
leadership blogs to news, videos, case studies, tutorials and more. Take a
look and join the conversation now. http://goparallel.sourceforge.net/
_______________________________________________
Zenloadbalancer-support mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/zenloadbalancer-support