Ghost Vulnerability

Howdy,

As many of you may have heard, there is a vulnerability nicknamed “Ghost” in the glibc library, which allows attackers to perform remote code execution on an unpatched server.

If you haven’t already, we highly recommend updating your system.

You can do that by running yum update on RHEL and CentOS, or apt-get update && apt-get upgrade on Ubuntu and Debian.

After performing those updates, we’d suggest you reboot your server, though alternatively you could technically restart all the processes on your server relying on glibc (which is likely most of them).

You can read more about this vulberability here:

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0235

Thanks a lot. Great to know its patched in a simple yum update. All done my end :slight_smile:

Did you reboot or re start all processes regarding this update, if not the update is total vanity.

Rebooted all servers.