Robert Lopez:
> Discussion here about how fast we must patch glibc.
It is a bad bug. I suggest that you patch it.
Wietse
critical to the
college.
I asked here with specific concern about threat to servers running Postfix.
On Tue, Feb 23, 2016 at 2:03 PM, Marius Gologan
wrote:
> This one is better:
> http://www.liquidweb.com/kb/protecting-against-cve-2015-7547/
>
>
>
> *From:* Marius Gologan [
This one is better:
http://www.liquidweb.com/kb/protecting-against-cve-2015-7547/
From: Marius Gologan [mailto:marius.golo...@gmail.com]
Sent: Tuesday, February 23, 2016 11:01 PM
To: 'Robert Lopez'; 'Postfix users'
Subject: RE: CVE-2015-7547
Patches are avai
Patches are available for most Linux distributions. You need to verify your
version and update in case is necessary:
http://www.cyberciti.biz/faq/linux-patch-cve-2015-7547-glibc-getaddrinfo-stack-based-buffer-overflow/
From: owner-postfix-us...@postfix.org [mailto:owner-postfix-us
Does anyone have any knowledge of postfix being exploited via
CVE-2015-7547, glibc stack-based buffer overflow in getaddrinfo()? Any
concerns about the exploitability?
Discussion here about how fast we must patch glibc.
--
Robert Lopez
Unix Systems Administrator
Central New Mexico Community