This vulnerability affects all Linux distributions running versions of glibc older than 2.18, and exploits a buffer overflow in the Prior unsupported versions of the listed distributions may not have patches available.
It is recommended to upgrade any systems still running unsupported distributions.
(CVE-2015-5229) This flaw could be exploited in a variety of ways, basically any services/processes doing DNS requests could be a potential target and lead to remote code execution or full system control.
GHOST is a vulnerability that was announced on January 27th 2015, which affects the glibc library on Linux systems.
That's a pretty roundabout and inaccurate method.How do I detect running processes using a library package?