Time to update! Glibc library buffer overfl0w
February 17, 2016

Time to update! Glibc library buffer overfl0w

Posted on February 17, 2016  •  1 minutes  • 155 words  •  Suggest Changes

An important bug was discovered in the glibc library, no fancy name -yet- like GHOSTheartbleed or shellshock this time, it listens to CVE-2015-7547.

As a CentOS user myself, updating is easy, -and largely automated- but still be sure to check, cause the impact is great for this one!

yum update glibc

Today I got these :

 glibc      2.17-106.el7_2.4      
Updating for dependencies:
 glibc-common   2.17-106.el7_2.4 
 glibc-devel   2.17-106.el7_2.4    
 glibc-headers  2.17-106.el7_2.4

if you get older you could force an update of the repo’s :

yum clean all
yum update glibc

Now if you done this, you should restart all services that are facing network, as that is the attack vector. In short :

service sshd restart
service httpd restart
service nginx restart
service iptables restart
service postfix restart

better :

reboot -h now

SystemD has alternative :

systemctl daemon-reexec

Need a good & deep article ? debian & friends update info.

Stay updated & stay safe!


If you enjoyed this website, consider buying me a Dr. Pepper

Buy me a Dr PepperBuy me a Dr Pepper