Web Hosting Forum | Lunarpages


*
Welcome, Guest. Please login or register.
Did you miss your activation email?



Login with username, password and session length
October 24, 2014, 09:40:32 PM

Pages: [1]   Go Down
  Print  
Author Topic: Linux GNU libc (glibc) security vulnerability - CVE-2010-3847  (Read 2744 times)
perestrelka
Administrator
Master Jedi
*****
Offline Offline

Posts: 1397



« on: October 21, 2010, 10:50:45 AM »

Dear Customers,

We wanted to alert you about a major security risk for anyone running CentOS5/RHEL5 systems. The underlying bug in glibc can be used to gain root access given a local account, and an exploit for the vulnerability has been publicly released.

To see if your operating system is CentOS 5, please check the following in root SSH:

Code:
cat /etc/redhat-release

If it is CentOS5, the output will show "CentOS release 5.x" where x is an OS revision number.

To update, please execute the following:

Code:
yum update glibc*

There is no need to reboot the system or restart any system daemons.

We can perform this upgrade for you for a fee of $35. You would simply need to contact dedicated@lunarpages.com with the last 4 digits of your card on file and your account username or primary domain name.

Those who are on monitored hosting, please note we can provide this update for you at no cost.

Please note that CentOS/RHEL systems prior to version 5 are not vulnerable to this issue. You can read more about it at the following locations:

https://rhn.redhat.com/errata/RHSA-2010-0787.html
http://seclists.org/fulldisclosure/2010/Oct/257

If you have any questions, please contact dedicated@lunarpages.com with those questions.

Thank you,
Lunarpages System Administrator Team
Logged

Kind Regards,
Vlad Artamonov
Pages: [1]   Go Up
  Print  
 
Jump to: