Skip to main content
ExLibris

Knowledge Assistant

BETA
  • Subscribe by RSS
  • Back
    Aleph

     

    Ex Libris Knowledge Center
    1. Search site
      Go back to previous article
      1. Sign in
        • Sign in
        • Forgot password
    1. Home
    2. Aleph
    3. Knowledge Articles
    4. CVE-2015-0235 - "Ghost" vulnerability in the glibc library?

    CVE-2015-0235 - "Ghost" vulnerability in the glibc library?

    1. Last updated
    2. Save as PDF
    3. Share
      1. Share
      2. Tweet
      3. Share
    1. Additional Information
    • Article Type: General
    • Product: Aleph

    Problem Symptoms:
    All Unix/Linux systems that use the glibc (a popular command-line shell) are vulnerable to the
    Ghost vulnerability. GHOST is a buffer overflow bug affecting the gethostbyname() and
    gethostbyname2() function calls in the glibc library.

    Cause:
    OS

    Resolution:
    Implement the solution provided by Ex Libris security office described in document

    http://www.customercenter.exlibrisgroup.com/DocumentationCenter/Ex%20Libris%20Documentation/Cross-Product/Security/Security%20Updates/Security%20Update%20Customer%20Announcement-Ghost%20v2.pdf

    Additional Information

    This document also contains information about what actions Ex Libris are taking on the hosted environments.

    Category: System Management (500) - ALEPH

    Subject: ALEPH - 500


    • Article last edited: 1/30/2015
    View article in the Exlibris Knowledge Center
    1. Back to top
      • CVE-2014-6271 (shellshock bash bug) and /exlibris/product/util/bash
      • CVE-2017-12617 Apache-Tomcat vulnerability
    • Was this article helpful?

    Recommended articles

    1. Article type
      Topic
      Language
      English
      Product
      Aleph
    2. Tags
      1. ALEPH - 500
      2. contype:kba
      3. Prod:Aleph
      4. System Management (500) - ALEPH
      5. Type:General
    1. © Copyright 2025 Ex Libris Knowledge Center
    2. Powered by CXone Expert ®
    • Term of Use
    • Privacy Policy
    • Contact Us
    2025 Ex Libris. All rights reserved