Submit a ticketCall us

Training ClassSign up for Network Performance Monitor (NPM) and Scalability instructor-led classes

Attend our instructor-led classes, provided by SolarWinds® Academy, to discuss the more advanced monitoring mechanisms available in NPM as well as how to tune your equipment to optimize its polling capabilities. NPM classes offered:
NPM Custom Monitoring and Polling
Orion Platform Scalability

Reserve your seat.

Home > Success Center > Virtualization Manager (VMAN) > VMAN - Knowledgebase Articles > Updating glibc to a version which is not vulnerable to the GHOST bug

Updating glibc to a version which is not vulnerable to the GHOST bug

Created by Interspire Import, last modified by MindTouch on Jun 23, 2016

Views: 726 Votes: 0 Revisions: 8

Environment

6.1.1.

Even though the GHOST bug (CVE-2015-0235) is probably not exploitable on Virtualization Manager (VMan), you may still want to update glibc to a version which does not contain the vulnerability. To do so, complete either of the following procedures.

Option A: Using the rpm command

  1. Log in to the appliance using SSH.
  2. Run the following commands to download the updated files:
    cd /tmp/
    wget http://mirror.centos.org/centos-5/5/..._11.1.i686.rpm
    wget http://mirror.centos.org/centos-5/5/...1.1.x86_64.rpm
    wget http://mirror.centos.org/centos-5/5/...1.1.x86_64.rpm
  3. Run the following command to install the update:
    sudo rpm -Uvh glibc-2.5-123.el5_11.1.x86_64.rpm glibc-2.5-123.el5_11.1.i686.rpm glibc-common-2.5-123.el5_11.1.x86_64.rpm
If the Virtualization Manager appliance is not connected to the internet, download the files on a different system and transport them to the appliance, for example through SCP.

Option B: Using the yum command

  1. Log in to the appliance using SSH.
  2. Run the following command:
    sudo yum update glibc -y
Last modified

Tags

Classifications

Public