Update Your Linux System to Patch the GHOST Vulnerability
Security researchers discovered another security hole in Linux systems. The GHOST vulnerability might leave your system open to hackers.
The GHOST name derives from the issue with the GetHOST functions. Hackers access your system Through gethostbyname functions hackers can access a remote shell in Linux and seize control of your system without system credentials.
The severity of the vulnerability warrants immediate attention. Ubuntu, different versions of RHEL, CentOS 6 and 7, and Debian 7 are vulnerable to the problem. However, they all now supply patches. There is only one thing left for you to do. Go update and reboot your Linux system with the patch updates.
Qualys, a cloud security company, first discovered and announced the problem. For more information on the vulnerability, read about the original announcement at the Qualys blog.