Skip to content

Latest commit

 

History

History
61 lines (44 loc) · 1.8 KB

2016-02-17-time-to-update-glibc-library-buffer-overfl0w.md

File metadata and controls

61 lines (44 loc) · 1.8 KB
title author date url thumbnail categories
Time to update! Glibc library buffer overfl0w
svennd
2016-02-17 15:34:15 +0000
/time-to-update-glibc-library-buffer-overfl0w/
/img/2021/03/simon-stratford-_ILkd7aVqAM-unsplash.jpg
Linux
SysAdmin

An important bug was discovered in the glibc library, no fancy name -yet- like GHOSTheartbleed or shellshock this time, it listens to CVE-2015-7547.

As a CentOS user myself, updating is easy, -and largely automated- but still be sure to check, cause the impact is great for this one!

yum update glibc

Today I got these :

Updating:
 glibc      2.17-106.el7_2.4      
Updating for dependencies:
 glibc-common   2.17-106.el7_2.4 
 glibc-devel   2.17-106.el7_2.4    
 glibc-headers  2.17-106.el7_2.4

if you get older you could force an update of the repo's :

yum clean all
yum update glibc

Now if you done this, you should restart all services that are facing network, as that is the attack vector. In short :

service sshd restart
service httpd restart
service nginx restart
service iptables restart
service postfix restart
...

better :

reboot -h now

SystemD has alternative :

systemctl daemon-reexec

Need a good & deep article ? debian & friends update info.

Stay updated & stay safe!