How To Patch the Linux Ghost gethostbyname Buffer Overflow Vulnerability in glibc

Published Date Author: , Posted January 28th, 2015 at 12:22:10pm

As per ARS Technica:
“An extremely critical vulnerability affecting most Linux distributions gives attackers the ability to execute malicious code on servers used to deliver e-mail, host webpages, and carry out other vital functions.”

To patch, run:
yum update glibc

Article: http://arstechnica.com/security/2015/01/highly-critical-ghost-allowing-code-execution-affects-most-linux-systems/

Amazon Alert: https://alas.aws.amazon.com/ALAS-2015-473.html

Original Advisory: http://www.openwall.com/lists/oss-security/2015/01/27/9

No comments as yet.

Leave Your Comment  Leave a comment

All fields marked with "*" are required.