While certain distributions like Alpine Linux are exempt due to their use of musl libc instead of glibc, many popular distributions are potentially vulnerable and could be exploited in the near future.
Linux distribution vendors are urging users to upgrade to a non-vulnerable version of the library:
> While certain distributions like Alpine Linux are exempt due to their use of musl libc instead of glibc, many popular distributions are potentially vulnerable and could be exploited in the near future.
Linux distribution vendors are urging users to upgrade to a non-vulnerable version of the library:
* [Ubuntu](https://ubuntu.com/security/notices/USN-6409-1)
* [RedHat](https://access.redhat.com/security/cve/cve-2023-4911)
* [Debian](https://www.debian.org/security/2023/dsa-5514)
* [Fedora](https://bodhi.fedoraproject.org/updates/FEDORA-2023-63e5a77522)
* [Gentoo](https://security.gentoo.org/glsa/202310-03).
>Date Reported: 03 Oct 2023
My gad, it was 5 days ago fuckingfucks lol, and the patch still isn't a thing!
>>Date Reported:
03 Oct 2023
My gad, it was 5 days ago fuckingfucks lol, and the patch still isn't a thing!
Alright, I did an audit on all the VPS Poal and its services are running on and none of them are affected by that vulnerability (introduced in glibc version 2.34).
Alright, I did an audit on all the VPS Poal and its services are running on and none of them are affected by that vulnerability (introduced in glibc version 2.34).
(post is archived)