I normally just let the daily announce post to this list show what is available for updates, but there is a CVE (CVE-2015-7547) that needs a bit more attention which will be on today's announce list of updates. We released a new glibc yesterday for CentOS-6 and CentOS-7 .. it is VERY important that all users update to these versions: This update is rated as Critical by Red Hat, meaning that it is remotely exploitable under some circumstances. Make sure this update works in your environments and update as soon as you can. CentOS-7: https://lists.centos.org/pipermail/centos-announce/2016-February/021672.html https://rhn.redhat.com/errata/RHSA-2016-0176.html CentOS-6: https://lists.centos.org/pipermail/centos-announce/2016-February/021668.html https://rhn.redhat.com/errata/RHSA-2016-0175.html These mitigate CVE-2015-7547: https://access.redhat.com/security/cve/CVE-2015-7547 https://bugzilla.redhat.com/show_bug.cgi?id=1293532 Can't stress how important this update is .. here are a couple stories: http://arstechnica.com/security/2016/02/extremely-severe-bug-leaves-dizzying-number-of-apps-and-devices-vulnerable/ http://www.theregister.co.uk/2016/02/16/glibc_linux_dns_vulernability/ Please note that the ONLY way this is tested to work is with ALL updates from CentOS-6 or CentOS-7 applied along with the glibc updates. So a yum update with base and updates repo enabled is the ONLY tested scenario. Did I say *ONLY* enough? Thanks, Johnny Hughes
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx https://lists.centos.org/mailman/listinfo/centos