[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[ale] Update your systems *NOW*...
- Subject: [ale] Update your systems *NOW*...
- From: mike at trausch.us (Michael B. Trausch)
- Date: Wed, 28 Jan 2015 16:06:00 -0500
... if you have not done so very recently.
There is an arbitrary code execution vulnerability in glibc, which is at
the core of all systems, which was fixed in late 2013, but not
identified as a vulnerability until recently.
https://access.redhat.com/articles/1332213
Red Hat and CentOS are patched; but it is notable as noted in the
document link above: *All versions of glibc shipped with all variants of
Red Hat Enterprise Linux are affected.
*You can verify your system is patched by running the utility the source
of which appears here:
http://www.openwall.com/lists/oss-security/2015/01/27/9
If your system is patched, it will report "not vulnerable":
[mbt at pbx ~]$ ./ghost
vulnerable
[mbt at pbx ~]$ sudo yum update -y
[... OUTPUT TRIMMED ...]
[mbt at pbx ~]$ ./ghost
not vulnerable
Don't forget to restart daemon processes so that they get the new C
library, or running processes will continue to be vulnerable after the
update. To reload init, you must reboot the system.
? Mike
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.ale.org/pipermail/ale/attachments/20150128/fd11bc6d/attachment.html>