Updating glibc


This vulnerability affects all Linux distributions running versions of glibc older than 2.18, and exploits a buffer overflow in the Prior unsupported versions of the listed distributions may not have patches available.

It is recommended to upgrade any systems still running unsupported distributions.

(CVE-2015-5229) This flaw could be exploited in a variety of ways, basically any services/processes doing DNS requests could be a potential target and lead to remote code execution or full system control.

GHOST is a vulnerability that was announced on January 27th 2015, which affects the glibc library on Linux systems.

That's a pretty roundabout and inaccurate method.How do I detect running processes using a library package?



  1. Pingback:

  2. eric   •  

    By choosing to enter this website you are affirming under oath and penalties of perjury pursuant to Title 28 U.

  3. eric   •  

    These girls are so unrestrained that one can hardly believe.

  4. eric   •  

    Escort girls are able to provide the best company and really satisfy every need.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>