GHOST glibc Vulnerability Patched InMotion Hosting ContributorUpdated on January 28, 2015 1 Minute Read Issue: GHOST glibc Vulnerability Patched (CVE-2015-0235) Status: Our Systems Architecture team has patched all servers at this time. Who is impacted? None of InMotion Hosting’s customers should be affected . Estimated time until resolution: At this time all servers have been patched. Additional information about CVE-2015-0235: On January 27th, 2015 a buffer overflow was discovered and disclosed within the __nss_hostname_digits_dots() function of the GNU C Library (glibc). This bug is reachable both locally and remotely via the gethostbyname*() functions. Like all serious vulnerabilities recently, it has been given an affectionate nickname of “GHOST“. Read the original security announcement here: CVE-2015-0235. Share this Article IC InMotion Hosting Contributor Content Writer InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals! More Articles by InMotion Hosting Related Articles Intro to Migrating your WordPress Site Data Migrating your WordPress Database Migrating WordPress Files Configuring WordPress After a Migration Testing your WordPress website after Migration How to Move WordPress from a Subfolder to the Root Directory What to expect during a mass server migration Move Your WordPress Site to a New Server Moving Websites Built with Older Technology into WordPress How to Export Your WordPress Sites