GHOST glibc Vulnerability Patched

Issue:GHOST glibc Vulnerability Patched (CVE-2015-0235)
Status:Our Systems Architecture team has patched all servers at this time.
Who is impacted?None of InMotion Hosting’s customers should be affected


Estimated time until resolution:At this time all servers have been patched.

Additional information about CVE-2015-0235:

On January 27th, 2015 a buffer overflow was discovered and disclosed within the __nss_hostname_digits_dots() function of the GNU C Library (glibc). This bug is reachable both locally and remotely via the gethostbyname*() functions. Like all serious vulnerabilities recently, it has been given an affectionate nickname of “GHOST“. Read the original security announcement here: CVE-2015-0235.

John-Paul Briones Content Writer II

John-Paul is an Electronics Engineer that spent most of his career in IT. He has been a Technical Writer for InMotion since 2013.

More Articles by John-Paul

Was this article helpful? Join the conversation!