glibc vulnerability: Action required for Linux users

February 17, 2016   |  Vas Vasiliadis

On February 16, 2016 a new critical vulnerability CVE-2015-7547 - "glibc getaddrinfo() stack-based buffer overflow" was announced. We have reviewed the severity and impact to Globus services, partner services and users, and posted details of our findings in a new security bulletin. We recommend corrective action for users who are operating Globus endpoints on Linux systems - please read the security bulletin for further details. If you have any concerns about this issue, please contact our support team at support@globus.org.