Patches are available for most Linux distributions. You need to verify your 
version and update in case is necessary:

http://www.cyberciti.biz/faq/linux-patch-cve-2015-7547-glibc-getaddrinfo-stack-based-buffer-overflow/





From: owner-postfix-us...@postfix.org [mailto:owner-postfix-us...@postfix.org] 
On Behalf Of Robert Lopez
Sent: Tuesday, February 23, 2016 10:57 PM
To: Postfix users
Subject: CVE-2015-7547



Does anyone have any knowledge of postfix being exploited via CVE-2015-7547, 
glibc stack-based buffer overflow in getaddrinfo()? Any concerns about the 
exploitability?

Discussion here about how fast we must patch glibc.


-- 

Robert Lopez
Unix Systems Administrator
Central New Mexico Community College (CNM)
525 Buena Vista SE
Albuquerque, New Mexico 87106

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to