<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8">
</head>
<body text="#000000" bgcolor="#FFFFFF">
After a few days of dealing with GHOST, here's a link on the fix
(which, essentially, entails updating glibc):
<a class="moz-txt-link-freetext" href="http://www.cloudlinux.com/blog/clnews/glibc-ghost-remote-vulnerability-cve20150235.php">http://www.cloudlinux.com/blog/clnews/glibc-ghost-remote-vulnerability-cve20150235.php</a><br>
<br>
The vulnerability is that an attacker could gain the ability to
execute code after sending an e-mail. It looks to affect, mainly,
Exim servers. Not as bad as Heartbleed or POODLE, but it still
merits attention from the open-source world. <br>
<br>
Robert<br>
<br>
<small><small><i>Note: This message is only for informational
purposes and I do not speak for anyone (my employer included)
but myself. Use the information in this message at your own
risk. This message is not to be considered </i></small></small><small><small><i>representative
of the official views of Liquidweb, Inc.</i></small></small><br>
</body>
</html>