title | author | date | url | thumbnail | categories | ||
---|---|---|---|---|---|---|---|
Time to update! Glibc library buffer overfl0w |
svennd |
2016-02-17 15:34:15 +0000 |
/time-to-update-glibc-library-buffer-overfl0w/ |
/img/2021/03/simon-stratford-_ILkd7aVqAM-unsplash.jpg |
|
An important bug was discovered in the glibc library, no fancy name -yet- like GHOST, heartbleed or shellshock this time, it listens to CVE-2015-7547.
As a CentOS user myself, updating is easy, -and largely automated- but still be sure to check, cause the impact is great for this one!
yum update glibc
Today I got these :
Updating: glibc 2.17-106.el7_2.4 Updating for dependencies: glibc-common 2.17-106.el7_2.4 glibc-devel 2.17-106.el7_2.4 glibc-headers 2.17-106.el7_2.4
if you get older you could force an update of the repo's :
yum clean all yum update glibc
Now if you done this, you should restart all services that are facing network, as that is the attack vector. In short :
service sshd restart service httpd restart service nginx restart service iptables restart service postfix restart ...
better :
reboot -h now
SystemD has alternative :
systemctl daemon-reexec
Need a good & deep article ? debian & friends update info.
Stay updated & stay safe!