Difference between revisions of "Linux "Ghost" (glibc) Vulnerability (January 2015)"

From ECE Information Technology Services
Jump to navigationJump to search
 
Line 3: Line 3:
 
ECE "managed" Linux workstations will be patched via the department's Linux configuration management service.
 
ECE "managed" Linux workstations will be patched via the department's Linux configuration management service.
  
If you operate an un-managed Linux workstation, please ensure you patch your Linux OS using your distributions package management tools as soon as possible.
+
If you operate an un-managed Linux workstation, please ensure you patch your Linux OS using your distribution's package management tools as soon as possible.
  
 
More information may be found at http://it.ubc.ca/linux-ghost-vulnerability
 
More information may be found at http://it.ubc.ca/linux-ghost-vulnerability

Latest revision as of 17:16, 28 January 2015

A serious vulnerability, termed “Ghost”, has been identified in some versions of the GNU C Library (glibc), triggered by gethostbyname functions. The vulnerability affects unpatched versions of popular Linux distributions, such as Red Hat, Debian, SUSE, and Ubuntu.

ECE "managed" Linux workstations will be patched via the department's Linux configuration management service.

If you operate an un-managed Linux workstation, please ensure you patch your Linux OS using your distribution's package management tools as soon as possible.

More information may be found at http://it.ubc.ca/linux-ghost-vulnerability