CVE-2015-7547: getaddrinfo() stack-based buffer overflow

Reindl Harald h.reindl at thelounge.net
Wed Feb 17 16:34:19 UTC 2016



Am 17.02.2016 um 17:22 schrieb Dominique Jullier:
> Are they any thoughts around, how to handle yesterday's glibc
> vulnerability[1][2] from the side bind?
>
> Since it is a rather painful task in order to update all hosts to a new
> version of glibc, we were thinking about other possible workarounds

Fedora, RHEL and Debian as well as likely all other relevant 
distributions are providing a patched glibc - dunno what is "rather 
painful" to apply a ordinary update like kernel security updates and 
restart all network relevant processes or reboot

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 181 bytes
Desc: OpenPGP digital signature
URL: <https://lists.isc.org/pipermail/bind-users/attachments/20160217/9d7383c1/attachment.bin>


More information about the bind-users mailing list