Submit a ticketCall us

Solarwinds & Cisco Live! Barcelona
Join us from the 29th of January to the 2nd of February at Cisco Live 2018 in Barcelona, where we will continue to show how monitoring the network with SolarWinds will keep you ahead of the game. At our booth (WEP 1A), we will demonstrate how SolarWinds network solutions can help. As a bonus, we are also hosting a pre-event webinar - Blame the Network, Hybrid IT Edition with our SolarWinds Head Geek™, Patrick Hubbard on January 24th - GMT (UTC+0): 10:00 a.m. to 11:00 a.m. There's still time to RSVP.

Home > Success Center > Virtualization Manager (VMAN) > Updating glibc to a version which is not vulnerable to the GHOST bug

Updating glibc to a version which is not vulnerable to the GHOST bug

Created by Interspire Import, last modified by MindTouch on Jun 23, 2016

Views: 704 Votes: 0 Revisions: 8

Environment

6.1.1.

Even though the GHOST bug (CVE-2015-0235) is probably not exploitable on Virtualization Manager (VMan), you may still want to update glibc to a version which does not contain the vulnerability. To do so, complete either of the following procedures.

Option A: Using the rpm command

  1. Log in to the appliance using SSH.
  2. Run the following commands to download the updated files:
    cd /tmp/
    wget http://mirror.centos.org/centos-5/5/..._11.1.i686.rpm
    wget http://mirror.centos.org/centos-5/5/...1.1.x86_64.rpm
    wget http://mirror.centos.org/centos-5/5/...1.1.x86_64.rpm
  3. Run the following command to install the update:
    sudo rpm -Uvh glibc-2.5-123.el5_11.1.x86_64.rpm glibc-2.5-123.el5_11.1.i686.rpm glibc-common-2.5-123.el5_11.1.x86_64.rpm
If the Virtualization Manager appliance is not connected to the internet, download the files on a different system and transport them to the appliance, for example through SCP.

Option B: Using the yum command

  1. Log in to the appliance using SSH.
  2. Run the following command:
    sudo yum update glibc -y
Last modified

Tags

Classifications

Public