GLIBC DNS Vulnerability
You need to update your Linux server's installation of glibc
immediately to protect it from a stack-based buffer overflow which was discovered on February 16, 2016.
Note: You only need to perform this update if you have a VPS or dedicated server. Customers with shared hosting accounts do not need to do anything.
Have GoDaddy update glibc for me
For $79, GoDaddy will update glibc
for you. To buy this service, give us a call at (480) 463-8824.
Update glibc myself
- Connect to your server via SSH.
- Run one of the following commands, based on your OS:
OS Do this... CentOS 6+
Fedora 22+
Red Hat 10+sudo yum -y update glibc glibc-common glibc-devel glibc-headers glibc-static glibc-utils nscdUbuntu 12.04+ sudo apt-get update && sudo apt-get install --only-upgrade libc6CentOS 5 Nothing - this OS is not affected Other OSes See Unsupported operating systems (GLIBC DNS vulnerability)
Your version of glibc
should now be updated.