Issue: |
GHOST glibc Vulnerability Patched (CVE-2015-0235) |
Status: | Our Systems Architecture team has patched all servers at this time. |
Who is impacted? | None of WebHosting Hub's customers should be affected. |
Estimated time until resolution: | At this time all servers have been patched. |
Additional information about CVE-2015-0235:
On January 27th, 2015 a buffer overflow was discovered and disclosed within the __nss_hostname_digits_dots() function of the GNU C Library (glibc). This bug is reachable both locally and remotely via the gethostbyname*() functions. Like all serious vulnerabilities recently, it has been given an affectionate nickname of “GHOST“. Read the original security announcement here: CVE-2015-0235.
We value your feedback!
There is a step or detail missing from the instructions.
The information is incorrect or out-of-date.
It does not resolve the question/problem I have.
new! - Enter your name and email address above and we will post your feedback in the comments on this page!