GHOST Vulnerability. This WILL affect you

58b2cc8c-e700-4376-b1a4-6b25b2e2916eYesterday evening a vulnerability in the GNU C Library (glibc) was disclosed (CVE-2015-0235). It could allow remote attackers to take control of the operating system by exploiting a buffer overflow bug in glibc’s GetHOST functions. Versions of the GNU C Library prior to glibc-2.18 are vulnerable.

Like Shellshock and Heartbleed, the GHOST vulnerability is serious and needs patches applied as soon as possible. However, due to number of processes on your server(s) which use the GNU C Library, not only does the patch need to be applied, but also the server needs to be rebooted to allow the updated library to be fully loaded.

Reconnix will be rolling out patches via their orchestration system this morning and a Support Technician will be calling customers this morning to schedule times for servers to be rebooted as soon as possible. If you have a specific requirement for a time for your server to be rebooted, then please raise a ticket with the Reconnix support desk, either via the Reconnix Portal or by emailing support@reconnix.com.

For more details on the GHOST vulnerability please see:


Contact Us