GLIBC DNS Vulnerability

You need to update your Linux server's installation of glibc immediately to protect it from a stack-based buffer overflow which was discovered on February 16, 2016.

Note: You only need to perform this update if you have a VPS or dedicated server. Customers with shared hosting accounts do not need to do anything.

Have HostingDude.com update glibc for me

For $79, HostingDude.com will update glibc for you. To buy this service, give us a call at (800) 655-5512 .

Update glibc myself

  1. Connect to your server via SSH.
  2. Run one of the following commands, based on your OS:
    OS Do this...
    CentOS 6+
    Fedora 22+
    Red Hat 10+
    sudo yum -y update glibc glibc-common glibc-devel glibc-headers glibc-static glibc-utils nscd
    Ubuntu 12.04+
    sudo apt-get update && sudo apt-get install --only-upgrade libc6
    CentOS 5 Nothing - this OS is not affected
    Other OSes see Unsupported operating systems (GLIBC DNS vulnerability)

Your version of glibc should now be updated.

Next step