{"id":465,"date":"2015-01-30T03:45:53","date_gmt":"2015-01-30T00:45:53","guid":{"rendered":"http:\/\/www.linux-destek.com\/?p=465"},"modified":"2015-01-30T03:45:53","modified_gmt":"2015-01-30T00:45:53","slug":"linux-ghost-uzaktan-kod-calistirma-guvenlik-acigi","status":"publish","type":"post","link":"https:\/\/www.48k.com.tr\/linux-ghost-uzaktan-kod-calistirma-guvenlik-acigi\/","title":{"rendered":"Linux “Ghost” Uzaktan Kod \u00c7al\u0131\u015ft\u0131rma G\u00fcvenlik A\u00e7\u0131\u011f\u0131"},"content":{"rendered":"

\"tux187\"<\/a>27 Ocakta haberi duyurulan ve ciddi risk ta\u015f\u0131yan GNU C Library (glibc) zaafiyetinden faydalanarak sunucunun kontrol\u00fc k\u00f6t\u00fc niyetli ki\u015filer taraf\u0131ndan ele ge\u00e7irilebiliyor.<\/p>\n

S\u00f6z konusu a\u00e7\u0131k, glibc 2.18 \u00f6ncesi versiyonlar\u0131 etkiliyor.2.18 ve sonras\u0131nda \u015fu anda b\u00f6yle bir risk bulunmad\u0131\u011f\u0131 ifade ediliyor.<\/p>\n

Pek \u00e7ok linux da\u011f\u0131t\u0131m\u0131 var ancak genel olarak hepsi ya Redhat ya da Debian t\u00fcrevi.Ubuntu’ya da sayacak olursak hemen hemen her linux sunucu bu tehdit alt\u0131nda.<\/p>\n

A\u015fa\u011f\u0131daki adreslerde ,konuyla ilgili a\u00e7\u0131klama ve g\u00fcncelleme i\u00e7in gerekli bilgiler yer al\u0131yor.<\/p>\n

Ubuntu<\/strong><\/p>\n

http:\/\/www.ubuntu.com\/usn\/usn-2485-1\/<\/p>\n

Debian<\/strong><\/p>\n

https:\/\/www.debian.org\/security\/2015\/dsa-3142<\/p>\n

Redhat<\/strong><\/p>\n

https:\/\/access.redhat.com\/security\/cve\/CVE-2015-0235<\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

27 Ocakta haberi duyurulan ve ciddi risk ta\u015f\u0131yan GNU C Library (glibc) zaafiyetinden faydalanarak sunucunun kontrol\u00fc k\u00f6t\u00fc niyetli ki\u015filer taraf\u0131ndan ele ge\u00e7irilebiliyor. S\u00f6z konusu a\u00e7\u0131k, glibc 2.18 \u00f6ncesi versiyonlar\u0131 etkiliyor.2.18 ve sonras\u0131nda \u015fu anda b\u00f6yle bir risk bulunmad\u0131\u011f\u0131 ifade ediliyor. Pek \u00e7ok linux da\u011f\u0131t\u0131m\u0131 var ancak genel olarak hepsi ya Redhat ya da Debian t\u00fcrevi.Ubuntu’ya […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[449,291,358,438],"tags":[302,466,467,287,351,82,468,93,454,469],"class_list":["post-465","post","type-post","status-publish","format-standard","hentry","category-linux-sunucu-yonetimi","category-uncategorized-tr","category-web-sunuculari","category-yasasin-tam-bagimsiz-debian-ve-turevleri","tag-debian","tag-ghost-acigi","tag-hayalet-acigi","tag-linux","tag-linux-sunucu-kurulumu-2","tag-linux-sunucu-yonetimi","tag-redhat","tag-sunucu-yonetimi","tag-ubuntu","tag-uzaktan-kod-calistirma"],"_links":{"self":[{"href":"https:\/\/www.48k.com.tr\/wp-json\/wp\/v2\/posts\/465"}],"collection":[{"href":"https:\/\/www.48k.com.tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.48k.com.tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.48k.com.tr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.48k.com.tr\/wp-json\/wp\/v2\/comments?post=465"}],"version-history":[{"count":0,"href":"https:\/\/www.48k.com.tr\/wp-json\/wp\/v2\/posts\/465\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.48k.com.tr\/wp-json\/wp\/v2\/media?parent=465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.48k.com.tr\/wp-json\/wp\/v2\/categories?post=465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.48k.com.tr\/wp-json\/wp\/v2\/tags?post=465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}