Skip to content

Instantly share code, notes, and snippets.

@cwshu
Created January 30, 2015 09:53
Show Gist options
  • Save cwshu/3f6c25647a4a30e08195 to your computer and use it in GitHub Desktop.
Save cwshu/3f6c25647a4a30e08195 to your computer and use it in GitHub Desktop.
Ghost - glibc buffer overflow vulnerability
ghost: glibc 的 gethostbyname(解 domain name 的 function) 出現 buffer overflow 的 bug,可以讓 attacker 完整控制這支程式
補救方法是 update glibc,而且將所有有用到 glibc 的 process 重新啟動。
update patch guide [centos]: https://www.centosblog.com/critical-glibc-remote-vulnerability-exploit-ghost-patch-glibc-now/
centos6 的 glibc patch 版本號: http://lists.centos.org/pipermail/centos-announce/2015-January/020907.html
centos7 的 glibc patch 版本號: http://lists.centos.org/pipermail/centos-announce/2015-January/020908.html
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment