Message #670 des archives de la Liste ecs-isp@2rosenthals.com

De: "Peter Moylan" <ecs-isp@2rosenthals.com> En-têtes complèts
Message brut
Sujet: Re: [eCS-ISP] "A vulnerability has been discovered in glibc"
Date: Tue, 13 Feb 2024 10:14:45 +1100
À: eCS ISP Mailing List <ecs-isp@2rosenthals.com>

On 13/02/24 09:40, Massimo S. wrote:
Hi all,

this could be a risk for our systems?

thanks

https://www.kaspersky.com/blog/cve-2023-6246-glibc-vulnerability/50369/?reseller=sea_regular-sm_acq_ona_smm__onl_b2b_twi_lnk_sm-team______&utm_source=twitter&utm_medium=social&utm_campaign=apac_regular-sm_ab0218&utm_content=link&utm_term=apac_twitter_organic_sfvpg2189o8cjup short url:

https://is.gd/LKBxIt

massimo



The attacker must first have access to your system. Thus, you should be safe unless you're allowing remote users to log in using something like SSH.

I can confirm that my SFTPD does not use glibc.

--
Peter Moylan                         http://www.pmoylan.org


Abonner: Direct, Résumé, Index.
Désabonner
Écrire au gestionnaire de la liste