GHOST glibc Vulnerability Patched Updated on January 28, 2015 by InMotion Hosting Contributor 0 Minutes, 31 Seconds to Read Issue: GHOST glibc Vulnerability Patched (CVE-2015-0235) Status: Our Systems Architecture team has patched all servers at this time. Who is impacted? None of InMotion Hosting’s customers should be affected . Estimated time until resolution: At this time all servers have been patched. Additional information about CVE-2015-0235: On January 27th, 2015 a buffer overflow was discovered and disclosed within the __nss_hostname_digits_dots() function of the GNU C Library (glibc). This bug is reachable both locally and remotely via the gethostbyname*() functions. Like all serious vulnerabilities recently, it has been given an affectionate nickname of “GHOST“. Read the original security announcement here: CVE-2015-0235. Share this Article IC InMotion Hosting Contributor Content Writer InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals! More Articles by InMotion Hosting Related Articles BlaB! AX Maintenance Mode How to Log in to BlaB! AX 6 Ways to Improve Website Accessibility How to Create HTML Pages with the CherryTree Note-Taking Application Connecting with Google Analytics in Jetpack Search Engine Optimization with Jetpack Professional FlatPress Themes and Styles How to Manage User Account Settings in OctoberCMS Force HTTPS in OctoberCMS with RedirectToHTTPS How to Uninstall Plugins in OctoberCMS