Hacker News
- CVE-2015-0235 – GHOST: glibc gethostbyname buffer overflow http://www.openwall.com/lists/oss-security/2015/01/27/9 241 comments
Lobsters
- CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow https://marc.info/?l=oss-security&m=142237659419786&w=2 4 comments linux , security
- CVE-2015-0235: This is my work-life now... http://i58.tinypic.com/2nscpsh.jpg 25 comments linux
- Patching the GHOST glibc gethostbyname CVE-2015-0235 bug https://sysadmincasts.com/episodes/44-patching-the-ghost-glibc-gethostbyname-cve-2015-0235-bug 5 comments linux
- Patching CVE-2015-0235 aka GHOST http://product.reverb.com/2015/01/28/patching-cve-2015-0235-aka-ghost-2/ 3 comments linux
- Arbitrary code execution vuln in glibc gethostbyname() CVE-2015-0235 https://bugzilla.redhat.com/show_bug.cgi?id=cve-2015-0235 61 comments programming
- Google knew about GHOST vulnerability (and patched ChromeOS) back in April 2014 (CVE-2015-0235) https://code.google.com/p/chromium/issues/detail?id=364511 11 comments netsec
- Another critical vuln that wouldn't have happened in safe Rust: CVE-2015-0235 - Buffer overflow on glibc's gethostby*, remote code execution possible http://www.openwall.com/lists/oss-security/2015/01/27/9 10 comments rust