Recently, a buffer overflow vulnerability was exposed in the gethostbyname function of the Linux GNUglibc standard library. The affected versions are Glibc2.2 to 2.17, including versions 2.2 and 2.17. If you are using a Linux server, check to see if your Linux server has this vulnerability. The following is a simple Linux glibc version checking technique.
How to check the glibc version in centos using linux find. The following editor will take centos 6.3 of the Linux system as an example to teach you how to check the glibc version.
First use the putty tool to log in to the Linux server, and then type the command: rpm-qa|grepglibc (after completion, press Enter to run), and then you can see the information as shown on the right.
glibc-devel-2.12-1.132.el6.x86_64
glibc-common-2.12-1.132.el6.x86_64
glibc-2.12-1.132.el6.x86_64
glibc-headers-2.12-1.132.el6.x86_64
From the information inside, you can see that 2.12 is the glibc version of centos.
In additionlinux check the lib library versionlinux check the lib library version, you can also check the output result of ls-l/lib/libc.so.6:
[root@Cluster~]#ls-l/lib/libc.so.6
lrwxrwxrwx.1rootroot125月2117:46/lib/libc.so.6->libc-2.12.so
------------------------------------------------- ---
Ubuntu users view the linux shell, please use the command to view: ls-l/lib/i386-linux-gnu/libc.so.6 output:
wzw@wzw-Lenovo:~$ls-l/lib/i386-linux-gnu/libc.so.6
The above is the detailed content of Linux GNU glibc standard library gethostbyname function buffer overflow vulnerability, does your server have it?. For more information, please follow other related articles on the PHP Chinese website!