A security bug Ghost glibc (CVE-2015-0235) was released Jan 27, 2014.
CSP/DCS:SA does utilize the glibc installed with the operating system however even if glibc has not been updated DCS:SA/CSP it is not vulnerable. In order to exploit the glibc vulnerability the user must already be root and have been given privileges in DCS:SA/CSP to disable/modify IPS policy so no additional rights can be gained using the exploit. We always recommend if using IPS policy to limit roots privileges don’t give root privileges to utilize the DCS:SA/CSP config tool which enables them to change IPS policy. To find and disable this option in the policy, please do the following: