glibc vulnerability: Action required for Linux users
February 17, 2016 | Vas Vasiliadis
On February 16, 2016 a new critical vulnerability CVE-2015-7547 - "glibc getaddrinfo() stack-based buffer overflow" was announced. We have reviewed the severity and impact to Globus services, partner services and users, and posted details of our findings in a new security bulletin. We recommend corrective action for users who are operating Globus endpoints on Linux systems - please read the security bulletin for further details. If you have any concerns about this issue, please contact our support team at email@example.com.