Cyber Security

Update Your Linux System to Patch the GHOST Vulnerability

January 28, 2015

Guest Author

Security researchers discovered another security hole in Linux systems. The GHOST vulnerability might leave your system open to hackers.

The GHOST name derives from the issue with the GetHOST functions. Hackers access your system Through gethostbyname functions hackers can access a remote shell in Linux and seize control of your system without system credentials.

The severity of the vulnerability warrants immediate attention. Ubuntu, different versions of RHEL, CentOS 6 and 7, and Debian 7 are vulnerable to the problem. However, they all now supply patches. There is only one thing left for you to do. Go update and reboot your Linux system with the patch updates.

Qualys, a cloud security company, first discovered and announced the problem. For more information on the vulnerability, read about the original announcement at the Qualys blog

subscribe by email

Stay Ahead

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.