for details about CVE-2015-0235
Vulnerability Summary for CVE-2015-0235
How To Patch and Protect Linux Server Against the Glibc GHOST Vulnerability # CVE-2015-0235
Qualys Security Advisory CVE-2015-0235
Currently Redhat, CentOS, OracleLinux already have fix on this patch.
Please run.:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 |
#yum update glibc Dependencies Resolved ================================================================================ Package Arch Version Repository Size ================================================================================ Updating: glibc i686 2.17-55.el7_0.5 updates 4.2 M glibc x86_64 2.17-55.el7_0.5 updates 3.6 M Updating for dependencies: glibc-common x86_64 2.17-55.el7_0.5 updates 11 M glibc-devel x86_64 2.17-55.el7_0.5 updates 1.0 M glibc-headers x86_64 2.17-55.el7_0.5 updates 651 k Transaction Summary ================================================================================ Upgrade 2 Packages (+3 Dependent packages) Total download size: 21 M Is this ok [y/d/N]: |
To Fix.
After the fix:
1 2 3 4 5 6 |
[suse@t430z tmp]$ bash GHOST-test.sh.txt Vulnerable glibc version <= 2.17-54 Vulnerable glibc version <= 2.5-122 Vulnerable glibc version <= 2.12-1.148 Detected glibc version 2.17 revision 55 Not Vulnerable. |
References:
Redhat: Bug 1183461 – (CVE-2015-0235) CVE-2015-0235 glibc: __nss_hostname_digits_dots() heap-based buffer overflow
Security Advisory Critical: glibc security update
CentOS: CentOS 7 – CVE-2015-0235
OracleLinux: [El-errata] ELSA-2015-0092 Critical: Oracle Linux 6 glibc security update