Patches are available for most Linux distributions. You need to verify your version and update in case is necessary:
http://www.cyberciti.biz/faq/linux-patch-cve-2015-7547-glibc-getaddrinfo-stack-based-buffer-overflow/ From: owner-postfix-us...@postfix.org [mailto:owner-postfix-us...@postfix.org] On Behalf Of Robert Lopez Sent: Tuesday, February 23, 2016 10:57 PM To: Postfix users Subject: CVE-2015-7547 Does anyone have any knowledge of postfix being exploited via CVE-2015-7547, glibc stack-based buffer overflow in getaddrinfo()? Any concerns about the exploitability? Discussion here about how fast we must patch glibc. -- Robert Lopez Unix Systems Administrator Central New Mexico Community College (CNM) 525 Buena Vista SE Albuquerque, New Mexico 87106
smime.p7s
Description: S/MIME cryptographic signature