Time to update! Glibc library buffer overfl0w
Posted on February 17, 2016 • 1 minutes • 155 words • Suggest Changes
An important bug was discovered in the glibc library, no fancy name -yet- like GHOST, heartbleed or shellshock this time, it listens to CVE-2015-7547.
As a CentOS user myself, updating is easy, -and largely automated- but still be sure to check, cause the impact is great for this one!
yum update glibc
Today I got these :
Updating: glibc 2.17-106.el7_2.4 Updating for dependencies: glibc-common 2.17-106.el7_2.4 glibc-devel 2.17-106.el7_2.4 glibc-headers 2.17-106.el7_2.4
if you get older you could force an update of the repo’s :
yum clean all yum update glibc
Now if you done this, you should restart all services that are facing network, as that is the attack vector. In short :
service sshd restart service httpd restart service nginx restart service iptables restart service postfix restart ...
better :
reboot -h now
SystemD has alternative :
systemctl daemon-reexec
Need a good & deep article ? debian & friends update info.
Stay updated & stay safe!