For Cloudways, customer trust is the key indicator for its performance. We have garnered this by providing managed security on cloud servers launched through Cloudways Cloud Platform. The trust customers have shown in us comes with a great responsibility.
This is why we feel obliged to keep them updated about the steps we have taken to address the GHOST vulnerability issue facing Linux distros.
The researchers working at Qualys announced yesterday that a glibc vulnerability, involving a buffer overflow, had affected the security of Linux systems. The GHOST Vulnerability poses a serious threat to Linux glibc library. It allows attackers to take control of a system without prior knowledge of its credentials. This vulnerability can be triggered by using gethostbyname*()
functions in glibc.
As the situation stands, the GHOST vulnerability has affected our cloud servers and we have taken corrective measures. Our Technical Support Team is currently patching all the affected servers and we are ensuring everything goes uninterrupted. You do not have to worry about anything as we are managing this for you.
For the latest updates, check our Status Page to follow up the progress.
If you have any concerns, please feel free to start a Live Chat with our Cloud Support Team.
Pere Hospital
Pere Hospital (CISSP & OSCP) is the CTO and co-founder of Cloudways Ltd. He has over two decades of experience in IT Security, Risk Analysis and Virtualization Technologies. You can follow Pere on Twitter at @phospital and read his blog at www.perehospital.cat