


Recently, a buffer overflow vulnerability was exposed in the gethostbyname function of the Linux GNUglibc standard library. The affected versions are Glibc2.2 to 2.17, including versions 2.2 and 2.17. If you are using a Linux server, check to see if your Linux server has this vulnerability. The following is a simple Linux glibc version checking technique.
How to check the glibc version in centos using linux find. The following editor will take centos 6.3 of the Linux system as an example to teach you how to check the glibc version.
First use the putty tool to log in to the Linux server, and then type the command: rpm-qa|grepglibc (after completion, press Enter to run), and then you can see the information as shown on the right.
glibc-devel-2.12-1.132.el6.x86_64
glibc-common-2.12-1.132.el6.x86_64
glibc-2.12-1.132.el6.x86_64
glibc-headers-2.12-1.132.el6.x86_64
From the information inside, you can see that 2.12 is the glibc version of centos.
In additionlinux check the lib library versionlinux check the lib library version, you can also check the output result of ls-l/lib/libc.so.6:
[root@Cluster~]#ls-l/lib/libc.so.6
lrwxrwxrwx.1rootroot125月2117:46/lib/libc.so.6->libc-2.12.so
------------------------------------------------- ---
Ubuntu users view the linux shell, please use the command to view: ls-l/lib/i386-linux-gnu/libc.so.6 output:
wzw@wzw-Lenovo:~$ls-l/lib/i386-linux-gnu/libc.so.6
The above is the detailed content of Linux GNU glibc standard library gethostbyname function buffer overflow vulnerability, does your server have it?. For more information, please follow other related articles on the PHP Chinese website!

Linux is suitable for servers, development environments, and embedded systems. 1. As a server operating system, Linux is stable and efficient, and is often used to deploy high-concurrency applications. 2. As a development environment, Linux provides efficient command line tools and package management systems to improve development efficiency. 3. In embedded systems, Linux is lightweight and customizable, suitable for environments with limited resources.

Introduction: Securing the Digital Frontier with Linux-Based Ethical Hacking In our increasingly interconnected world, cybersecurity is paramount. Ethical hacking and penetration testing are vital for proactively identifying and mitigating vulnerabi

The methods for basic Linux learning from scratch include: 1. Understand the file system and command line interface, 2. Master basic commands such as ls, cd, mkdir, 3. Learn file operations, such as creating and editing files, 4. Explore advanced usage such as pipelines and grep commands, 5. Master debugging skills and performance optimization, 6. Continuously improve skills through practice and exploration.

Linux is widely used in servers, embedded systems and desktop environments. 1) In the server field, Linux has become an ideal choice for hosting websites, databases and applications due to its stability and security. 2) In embedded systems, Linux is popular for its high customization and efficiency. 3) In the desktop environment, Linux provides a variety of desktop environments to meet the needs of different users.

The disadvantages of Linux include user experience, software compatibility, hardware support, and learning curve. 1. The user experience is not as friendly as Windows or macOS, and it relies on the command line interface. 2. The software compatibility is not as good as other systems and lacks native versions of many commercial software. 3. Hardware support is not as comprehensive as Windows, and drivers may be compiled manually. 4. The learning curve is steep, and mastering command line operations requires time and patience.

Linuxisnothardtolearn,butthedifficultydependsonyourbackgroundandgoals.ForthosewithOSexperience,especiallycommand-linefamiliarity,Linuxisaneasytransition.Beginnersmayfaceasteeperlearningcurvebutcanmanagewithproperresources.Linux'sopen-sourcenature,bas

The five basic components of Linux are: 1. The kernel, managing hardware resources; 2. The system library, providing functions and services; 3. Shell, the interface for users to interact with the system; 4. The file system, storing and organizing data; 5. Applications, using system resources to implement functions.

Opening a new chapter in smart home: Open source home automation system based on Ubuntu Smart home technology has revolutionized the way we interact with our living spaces, bringing convenience, safety and energy efficiency to our daily lives. From remote control of lights and appliances, to monitoring security cameras and automated climate control, smart home technology is becoming increasingly popular. However, many business smart home systems have limitations: high costs, privacy issues, and limited compatibility. Fortunately, open source software solutions combine the power of Ubuntu to provide an alternative – allowing users to create a customizable, cost-effective and secure smart home ecosystem. This guide will explore how to set up a home automation system using Ubuntu and open source tools.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

Atom editor mac version download
The most popular open source editor

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),