CVE-2015-7547: getaddrinfo() stack-based buffer overflow
Reindl Harald
h.reindl at thelounge.net
Wed Feb 17 16:34:19 UTC 2016
Am 17.02.2016 um 17:22 schrieb Dominique Jullier:
> Are they any thoughts around, how to handle yesterday's glibc
> vulnerability[1][2] from the side bind?
>
> Since it is a rather painful task in order to update all hosts to a new
> version of glibc, we were thinking about other possible workarounds
Fedora, RHEL and Debian as well as likely all other relevant
distributions are providing a patched glibc - dunno what is "rather
painful" to apply a ordinary update like kernel security updates and
restart all network relevant processes or reboot
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 181 bytes
Desc: OpenPGP digital signature
URL: <https://lists.isc.org/pipermail/bind-users/attachments/20160217/9d7383c1/attachment.bin>
More information about the bind-users
mailing list