Difference between revisions of "Linux "Ghost" (glibc) Vulnerability (January 2015)"
From ECE Information Technology Services
Jump to navigationJump to searchLine 3: | Line 3: | ||
ECE "managed" Linux workstations will be patched via the department's Linux configuration management service. | ECE "managed" Linux workstations will be patched via the department's Linux configuration management service. | ||
− | If you operate an un-managed Linux workstation, please ensure you patch your Linux OS using your | + | If you operate an un-managed Linux workstation, please ensure you patch your Linux OS using your distribution's package management tools as soon as possible. |
More information may be found at http://it.ubc.ca/linux-ghost-vulnerability | More information may be found at http://it.ubc.ca/linux-ghost-vulnerability |
Latest revision as of 16:16, 28 January 2015
A serious vulnerability, termed “Ghost”, has been identified in some versions of the GNU C Library (glibc), triggered by gethostbyname functions. The vulnerability affects unpatched versions of popular Linux distributions, such as Red Hat, Debian, SUSE, and Ubuntu.
ECE "managed" Linux workstations will be patched via the department's Linux configuration management service.
If you operate an un-managed Linux workstation, please ensure you patch your Linux OS using your distribution's package management tools as soon as possible.
More information may be found at http://it.ubc.ca/linux-ghost-vulnerability