Linux "Ghost" Remote Code Execution Vulnerability
Date: 28 January 2015
The purpose of this advisory is to bring attention to a recently discovered vulnerability in Linux GNU C Library (glibc).
CCIRC is aware of a critical vulnerability in Linux which could allow a remote attacker to execute arbitrary code with the permissions of the user running the application.
CVE Reference: CVE-2015-0235
Affected versions: versions prior to 2.18
CCIRC recommends that system administrators test and deploy the vendor released updates to affected platforms accordingly.
- Ubuntu: http://www.ubuntu.com/usn/usn-2485-1/
- Redhat: https://access.redhat.com/security/cve/CVE-2015-0235
- GNU C Library: http://www.gnu.org/software/libc/
- Debian: https://security-tracker.debian.org/tracker/CVE-2015-0235
Note to Readers
In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.
Please note, CCIRC PGP key has recently been updated.
For general information, please contact Public Safety Canada's Public Affairs division at:
Telephone: 613-944-4875 or 1-800-830-3118
- Date modified: