Recent Security Vulnerability in GLIBC

Document ID : KB000067538
Last Modified Date : 10/01/2019
Show Technical Document Details
Introduction:
To all those concerned about the GLIBC GHOST security bug and potential effects on Unix-based versions of UIM.

This is an Operating System level security issue and can only be addressed by a patch to the OS version of the glibc library that UIM uses (as does every other application).

Currently all of the OS vendors (SUSE, RedHat, etc) are releasing or have already released a patched version of glibc that should be installed ASAP for our clients on these platforms.

Please refer to your OS vendor security announcement regarding patching and restart procedures.

Recent versions of Debian and Ubuntu are NOT vulnerable, but the following older versions of Ubuntu and Debian *are* vulnerable and should be patched.

Debian 7 and older
Ubuntu 12.04 LTS, 10.04 LTS and older

With the new version of glibc installed you will need to at least restart all UIM hubs and robots. This can be performed by manually restarting those services or rebooting the system.?? Best IT change control practices apply. Bear in mind that there will almost certainly be many other OS services that will need to be restarted outside of UIM.

This notice will be posted on primary UIM support pages.

NOTE: Ubuntu and other Debian Linux based platforms are unaffected as they do not use the glibc library.

 
Instructions:
Please Update This Required Field