In this episode, we are going to be patching CentOS and Debian systems against glibc gethostbyname function bugs. System library security bugs present a special case, where even through you have patched the bug, you are likely still running vulnerable code, unless you reboot.
Print
Share
Comment
Cite
Upload
Translate
APA
() » #44 – Patching the GHOST glibc gethostbyname CVE-2015-0235 bug. Retrieved from https://www.truth.cx/2015/01/28/44-patching-the-ghost-glibc-gethostbyname-cve-2015-0235-bug/.
MLA" » #44 – Patching the GHOST glibc gethostbyname CVE-2015-0235 bug." - , https://www.truth.cx/2015/01/28/44-patching-the-ghost-glibc-gethostbyname-cve-2015-0235-bug/
HARVARD » #44 – Patching the GHOST glibc gethostbyname CVE-2015-0235 bug., viewed ,
VANCOUVER - » #44 – Patching the GHOST glibc gethostbyname CVE-2015-0235 bug. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2015/01/28/44-patching-the-ghost-glibc-gethostbyname-cve-2015-0235-bug/
CHICAGO" » #44 – Patching the GHOST glibc gethostbyname CVE-2015-0235 bug." - Accessed . https://www.truth.cx/2015/01/28/44-patching-the-ghost-glibc-gethostbyname-cve-2015-0235-bug/
IEEE" » #44 – Patching the GHOST glibc gethostbyname CVE-2015-0235 bug." [Online]. Available: https://www.truth.cx/2015/01/28/44-patching-the-ghost-glibc-gethostbyname-cve-2015-0235-bug/. [Accessed: ]