Re: CVE-2015-7547

2016-02-23 Thread Wietse Venema
Robert Lopez: > Discussion here about how fast we must patch glibc. It is a bad bug. I suggest that you patch it. Wietse

Re: CVE-2015-7547

2016-02-23 Thread Robert Lopez
critical to the college. I asked here with specific concern about threat to servers running Postfix. On Tue, Feb 23, 2016 at 2:03 PM, Marius Gologan wrote: > This one is better: > http://www.liquidweb.com/kb/protecting-against-cve-2015-7547/ > > > > *From:* Marius Gologan [

RE: CVE-2015-7547

2016-02-23 Thread Marius Gologan
This one is better: http://www.liquidweb.com/kb/protecting-against-cve-2015-7547/ From: Marius Gologan [mailto:marius.golo...@gmail.com] Sent: Tuesday, February 23, 2016 11:01 PM To: 'Robert Lopez'; 'Postfix users' Subject: RE: CVE-2015-7547 Patches are avai

RE: CVE-2015-7547

2016-02-23 Thread Marius Gologan
Patches are available for most Linux distributions. You need to verify your version and update in case is necessary: http://www.cyberciti.biz/faq/linux-patch-cve-2015-7547-glibc-getaddrinfo-stack-based-buffer-overflow/ From: owner-postfix-us...@postfix.org [mailto:owner-postfix-us

CVE-2015-7547

2016-02-23 Thread Robert Lopez
Does anyone have any knowledge of postfix being exploited via CVE-2015-7547, glibc stack-based buffer overflow in getaddrinfo()? Any concerns about the exploitability? Discussion here about how fast we must patch glibc. -- Robert Lopez Unix Systems Administrator Central New Mexico Community