CVE-2015-7547 glibc getaddrinfo Post Mortem

On Tuesday, February 16, 2016, Google[1], RedHat[2], and the glibc team collectively released a vulnerability report, patch and PoC for glibc.  It is safe to assume that all Linux machines were/are vulnerable.

Updates are available from all major linux distribution vendors and will require a reboot (just do an update with apt-get or yum).  Please update if you are using Linux.

Private Internet Access gateways were fully patched at night (PST) with all other servers within the stack shortly thereafter.  If you are using our Linux client[3], please upgrade as well.

Sign In or Register to comment.