GLIBC DNS Vulnerability
You need to update your Linux server's installation of glibc
immediately to protect it from a stack-based buffer overflow which was discovered on February 16, 2016.
Note: You only need to perform this update if you have a VPS or dedicated server. Customers with shared hosting accounts do not need to do anything.
Have HostingDude.com update glibc for me
For $79, HostingDude.com will update glibc
for you. To buy this service, give us a call at (800) 655-5512 .
Update glibc myself
- Connect to your server via SSH.
- Run one of the following commands, based on your OS:
OS Do this... CentOS 6+
Fedora 22+
Red Hat 10+sudo yum -y update glibc glibc-common glibc-devel glibc-headers glibc-static glibc-utils nscdUbuntu 12.04+ sudo apt-get update && sudo apt-get install --only-upgrade libc6CentOS 5 Nothing - this OS is not affected Other OSes see Unsupported operating systems (GLIBC DNS vulnerability)
Your version of glibc
should now be updated.