I was wondering today if this glibc problem had been fixed in KaOS.
Ghost vulnerability
Oppssss.... maybe this thread would be better have been placed within the "Build repo discussion". Excuse me if so.
Correct location.
Tested here a few times over the last months, example:
[anke@kf5sdc Downloads]$ wget https://webshare.uchicago.edu/orgs/ITServices/itsec/Downloads/GHOST.c
--2015-02-02 15:57:57-- https://webshare.uchicago.edu/orgs/ITServices/itsec/Downloads/GHOST.c
Resolving webshare.uchicago.edu (webshare.uchicago.edu)... 128.135.22.61
Connecting to webshare.uchicago.edu (webshare.uchicago.edu)|128.135.22.61|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 1046 (1.0K) [text/x-csrc]
Saving to: 'GHOST.c'
GHOST.c 100%[====================================================================================>] 1.02K --.-KB/s in 0s
2015-02-02 15:57:57 (112 MB/s) - 'GHOST.c' saved [1046/1046]
[anke@kf5sdc Downloads]$ gcc -o GHOST GHOST.c
[anke@kf5sdc Downloads]$ ./GHOST
not vulnerable
If anyone can come with another outcome then "not vulnerable", please note.
Thanks, demm.