Updating for Vulnerability CVE-2015-7547
Written by:
Will Kruss
on
28 April 2016 08:13 PM
|
|
Find out details about red hat support for the Common Vulnerability. Learn it youself by following step by step tutorial. OverviewThe Google Security Team and Red Hat have discovered a flaw in the way that certain types of DNS lookups are handled on some Linux servers. By exploiting this critical vulnerability, an attacker could gain full control over the system. ImpactThe code that causes the vulnerability was introduced in a 2008 update to the GNU C Library (glibc). That package contains a library against which all GNU/Linux programs are linked, and the flaw affects the version of glibc included in a number of current Linux distributions:
ResolutionOn affected servers, glibc needs to be updated and the server rebooted. First SSH to the server, see: https://www.vpsblocks.com.au/support/Knowledgebase/Article/View/41/0/how-do-i-use-ssh Step #1: Check the Current glibc Version
Step #2: Is the Installed Version Vulnerable?If the version returned by the command you ran above matches (or exceeds) the version listed below for your operating system, then the vulnerability already has been patched:
If the version returned by the command you ran in Step 1 is lower than what’s listed above for your operating system you will need to proceed to Step 3 to upgrade and reboot. Step #3: Update glibc on a Self-Managed ServerRun these commands as root to update and reboot:
Note: Please remember that following these steps, you must reboot the server in order for the update to take effect and ensure you’ve been secured. If you need assistance with this, please contact support and we can do this for you. This will require a server reboot to install the updates.
| |
|