

It is in no way perfect and is a bit longer with repetitions, but it does get the job done. Configuration management tools like ansible becomes a real boon in here.įor anyone who is not familiar with ansible, take a looks at the ansible intro page for details regarding ansible installation.Īn ansible playbook file to get the required information into a csv file is as follows. We recommend that you upgrade your glibc packages.Considering the recent glibc vulnerability, getting details regarding glibc versions can be a bit difficult when you are managing large server clusters with multiple OS versions. The old glibc anymore, it is recommended to reboot the machines afterįor the stable distribution (jessie), these problems have been fixed inįor the unstable distribution (sid), these problems will be fixed in While it is only necessary to ensure that all processes are not using No applications where this issue has a security impact (stack overflows), causing it the crash the process (denial of The catopen function contains several unbound stack allocations Szabolcs Nagy reported that the rarely-used hcreate and hcreate_rįunctions did not check the size argument properly, leading to aĬrash (denial of service) for certain arguments. Information to strftime no affected applications are known. Applications normally pass only valid time Is passed to strftime, the strftime function could crash or leak This vulnerability affects mostĪpplications which perform host name resolution using getaddrinfo,Īdam Nielsen discovered that if an invalid separated time value Internal buffers, leading to a stack-based buffer overflow andĪrbitrary code execution.

Host name resolver function, getaddrinfo, when processingĪF_UNSPEC queries (for dual A/AAAA lookups), could mismanage its The Google Security Team and Red Hat discovered that the glibc The first vulnerability listed below is considered to have critical Several vulnerabilities have been fixed in the GNU C Library, glibc. Debian Security Advisory DSA-3481-1 glibc - security update Date Reported: Affected Packages: glibc Vulnerable: Yes Security database references: In the Debian bugtracking system: Bug 812441, Bug 812445, Bug 812455.
