{"id":4103,"date":"2015-01-30T09:00:39","date_gmt":"2015-01-30T09:00:39","guid":{"rendered":"http:\/\/www.knowledgement.ie\/?p=4103"},"modified":"2015-01-30T09:00:39","modified_gmt":"2015-01-30T09:00:39","slug":"what-is-ghost-vulnerability-in-linux-serversdesktops","status":"publish","type":"post","link":"https:\/\/targetintegration.com\/en_gb\/what-is-ghost-vulnerability-in-linux-serversdesktops\/","title":{"rendered":"What is Ghost Vulnerability in Linux Servers\/Desktops?"},"content":{"rendered":"<p>Are you running a Linux server in your business or for your website or CRM? Then there is a possibility that it is affected with the Ghost Vulnerability.<\/p>\n<p><strong>Wondering what is Ghost Vulnerability?<\/strong><br \/>\n<span style=\"line-height: 1.5;\">It is a serious security problem found in the GNU C Library (Glibc) called Ghost.\u00a0<\/span><\/p>\n<p><strong>How do I\u00a0verify that my\u00a0server is vulnerable or not?<\/strong><br \/>\n<span style=\"line-height: 1.5;\">A list of operating systems affected is as below:<\/span><\/p>\n<ul>\n<li>RHEL (Red Hat Enterprise Linux) version 5.x, 6.x and 7.x<\/li>\n<li>CentOS Linux version 5.x, 6.x &amp; 7.x<\/li>\n<li>Ubuntu Linux version 10.04, 12.04 LTS<\/li>\n<li>Debian Linux version 7.x<\/li>\n<li>Linux Mint version 13.0<\/li>\n<li>Fedora Linux version 19 or older<\/li>\n<li>SUSE Linux Enterprise 11 and older (also OpenSuse Linux 11 or older versions)<\/li>\n<li>SUSE Linux Enterprise Software Development Kit 11 SP3<\/li>\n<li>SUSE Linux Enterprise Server 11 SP3 for VMware<\/li>\n<li>SUSE Linux Enterprise Server 11 SP3<\/li>\n<li>SUSE Linux Enterprise Server 11 SP2 LTSS<\/li>\n<li>SUSE Linux Enterprise Server 11 SP1 LTSS<\/li>\n<li>SUSE Linux Enterprise Server 10 SP4 LTSS<\/li>\n<li>SUSE Linux Enterprise Desktop 11 SP3<\/li>\n<li>Arch Linux glibc version &lt;= 2.18-1<\/li>\n<\/ul>\n<p><strong>My server is listed above, how do I fix this vulnerability?<\/strong><br \/>\nOne way is you can use the script provided by a number of different blog posts on the internet. One such script is available <a title=\"Fix Ghost Vulnerability in Linux Servers\" href=\"http:\/\/www.cyberciti.biz\/faq\/cve-2015-0235-patch-ghost-on-debian-ubuntu-fedora-centos-rhel-linux\/\" target=\"_blank\" rel=\"noopener\">here<\/a>. The other option is that you talk to your web hosting company or Target Integration and our expert engineers can fix the issue for you. Drop us an email at <a title=\"Email Target Integration Team\" href=\"mailto:info@targetintegration.com\" target=\"_blank\" rel=\"noopener\">info@targetintegration.com<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Are you running a Linux server in your business or for your website or CRM? Then there is a possibility&#8230;<\/p>","protected":false},"author":4,"featured_media":4108,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[216,210],"class_list":["post-4103","post","type-post","status-publish","has-post-thumbnail","hentry","category-article","tag-linux","tag-linux-server"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Ghost Vulnerability in Linux Servers\/Desktops? -<\/title>\n<meta name=\"description\" content=\"[vc_row][vc_column][vc_column_text]Are you running a Linux server in your business or for your website or CRM?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/targetintegration.com\/en_gb\/what-is-ghost-vulnerability-in-linux-serversdesktops\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Ghost Vulnerability in Linux Servers\/Desktops? -\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_column_text]Are you running a Linux server in your business or for your website or CRM?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/targetintegration.com\/en_gb\/what-is-ghost-vulnerability-in-linux-serversdesktops\/\" \/>\n<meta property=\"og:site_name\" content=\"Target Integration\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-30T09:00:39+00:00\" \/>\n<meta name=\"author\" content=\"Aman Thakral\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aman Thakral\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/\"},\"author\":{\"name\":\"Aman Thakral\",\"@id\":\"https:\/\/targetintegration.com\/#\/schema\/person\/9956d46591619b474ed534d4bae9a37d\"},\"headline\":\"What is Ghost Vulnerability in Linux Servers\/Desktops?\",\"datePublished\":\"2015-01-30T09:00:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/\"},\"wordCount\":251,\"commentCount\":6,\"publisher\":{\"@id\":\"https:\/\/targetintegration.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"Linux\",\"Linux Server\"],\"articleSection\":[\"Article\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/\",\"url\":\"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/\",\"name\":\"What is Ghost Vulnerability in Linux Servers\/Desktops? -\",\"isPartOf\":{\"@id\":\"https:\/\/targetintegration.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2015-01-30T09:00:39+00:00\",\"description\":\"[vc_row][vc_column][vc_column_text]Are you running a Linux server in your business or for your website or CRM?\",\"breadcrumb\":{\"@id\":\"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/targetintegration.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Ghost Vulnerability in Linux Servers\/Desktops?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/targetintegration.com\/#website\",\"url\":\"https:\/\/targetintegration.com\/\",\"name\":\"Target Integration\",\"description\":\"Empowering You!\",\"publisher\":{\"@id\":\"https:\/\/targetintegration.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/targetintegration.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/targetintegration.com\/#organization\",\"name\":\"Target Integration\",\"url\":\"https:\/\/targetintegration.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/targetintegration.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/targetintegration.com\/wp-content\/uploads\/\/2021\/05\/ti-logo2-2.svg\",\"contentUrl\":\"https:\/\/targetintegration.com\/wp-content\/uploads\/\/2021\/05\/ti-logo2-2.svg\",\"width\":172,\"height\":65,\"caption\":\"Target Integration\"},\"image\":{\"@id\":\"https:\/\/targetintegration.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/targetintegration.com\/#\/schema\/person\/9956d46591619b474ed534d4bae9a37d\",\"name\":\"Aman Thakral\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/targetintegration.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5d3832136f194dc02b46be42471b0a19833e6a89e0c27d4f36549afb93d2a431?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5d3832136f194dc02b46be42471b0a19833e6a89e0c27d4f36549afb93d2a431?s=96&d=mm&r=g\",\"caption\":\"Aman Thakral\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Ghost Vulnerability in Linux Servers\/Desktops? -","description":"[vc_row][vc_column][vc_column_text]Are you running a Linux server in your business or for your website or CRM?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/targetintegration.com\/en_gb\/what-is-ghost-vulnerability-in-linux-serversdesktops\/","og_locale":"en_GB","og_type":"article","og_title":"What is Ghost Vulnerability in Linux Servers\/Desktops? -","og_description":"[vc_row][vc_column][vc_column_text]Are you running a Linux server in your business or for your website or CRM?","og_url":"https:\/\/targetintegration.com\/en_gb\/what-is-ghost-vulnerability-in-linux-serversdesktops\/","og_site_name":"Target Integration","article_published_time":"2015-01-30T09:00:39+00:00","author":"Aman Thakral","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Aman Thakral","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/#article","isPartOf":{"@id":"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/"},"author":{"name":"Aman Thakral","@id":"https:\/\/targetintegration.com\/#\/schema\/person\/9956d46591619b474ed534d4bae9a37d"},"headline":"What is Ghost Vulnerability in Linux Servers\/Desktops?","datePublished":"2015-01-30T09:00:39+00:00","mainEntityOfPage":{"@id":"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/"},"wordCount":251,"commentCount":6,"publisher":{"@id":"https:\/\/targetintegration.com\/#organization"},"image":{"@id":"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/#primaryimage"},"thumbnailUrl":"","keywords":["Linux","Linux Server"],"articleSection":["Article"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/","url":"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/","name":"What is Ghost Vulnerability in Linux Servers\/Desktops? -","isPartOf":{"@id":"https:\/\/targetintegration.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/#primaryimage"},"image":{"@id":"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/#primaryimage"},"thumbnailUrl":"","datePublished":"2015-01-30T09:00:39+00:00","description":"[vc_row][vc_column][vc_column_text]Are you running a Linux server in your business or for your website or CRM?","breadcrumb":{"@id":"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/targetintegration.com\/en_ie\/what-is-ghost-vulnerability-in-linux-serversdesktops\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/targetintegration.com\/"},{"@type":"ListItem","position":2,"name":"What is Ghost Vulnerability in Linux Servers\/Desktops?"}]},{"@type":"WebSite","@id":"https:\/\/targetintegration.com\/#website","url":"https:\/\/targetintegration.com\/","name":"Target Integration","description":"Empowering You!","publisher":{"@id":"https:\/\/targetintegration.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/targetintegration.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/targetintegration.com\/#organization","name":"Target Integration","url":"https:\/\/targetintegration.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/targetintegration.com\/#\/schema\/logo\/image\/","url":"https:\/\/targetintegration.com\/wp-content\/uploads\/\/2021\/05\/ti-logo2-2.svg","contentUrl":"https:\/\/targetintegration.com\/wp-content\/uploads\/\/2021\/05\/ti-logo2-2.svg","width":172,"height":65,"caption":"Target Integration"},"image":{"@id":"https:\/\/targetintegration.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/targetintegration.com\/#\/schema\/person\/9956d46591619b474ed534d4bae9a37d","name":"Aman Thakral","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/targetintegration.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5d3832136f194dc02b46be42471b0a19833e6a89e0c27d4f36549afb93d2a431?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5d3832136f194dc02b46be42471b0a19833e6a89e0c27d4f36549afb93d2a431?s=96&d=mm&r=g","caption":"Aman Thakral"}}]}},"_links":{"self":[{"href":"https:\/\/targetintegration.com\/en_gb\/wp-json\/wp\/v2\/posts\/4103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/targetintegration.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/targetintegration.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/targetintegration.com\/en_gb\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/targetintegration.com\/en_gb\/wp-json\/wp\/v2\/comments?post=4103"}],"version-history":[{"count":0,"href":"https:\/\/targetintegration.com\/en_gb\/wp-json\/wp\/v2\/posts\/4103\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/targetintegration.com\/en_gb\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/targetintegration.com\/en_gb\/wp-json\/wp\/v2\/media?parent=4103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/targetintegration.com\/en_gb\/wp-json\/wp\/v2\/categories?post=4103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/targetintegration.com\/en_gb\/wp-json\/wp\/v2\/tags?post=4103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}