These forums are locked and archived, but all topics have been migrated to the new forum. You can search for this topic on the new forum: Search for Ghost Vulnerability on the new forum.
Howdy,
As many of you may have heard, there is a vulnerability nicknamed "Ghost" in the glibc library, which allows attackers to perform remote code execution on an unpatched server.
If you haven't already, we highly recommend updating your system.
You can do that by running yum update
on RHEL and CentOS, or apt-get update && apt-get upgrade
on Ubuntu and Debian.
After performing those updates, we'd suggest you reboot your server, though alternatively you could technically restart all the processes on your server relying on glibc (which is likely most of them).
You can read more about this vulberability here:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0235
Thanks a lot. Great to know its patched in a simple yum update. All done my end :)
Did you reboot or re start all processes regarding this update, if not the update is total vanity.
Chaos Reigns Within, Reflect, Repent and Reboot, Order Shall Return.
Rebooted all servers.