GLIBC DNS Vulnerability

You need to update your Linux server's installation of glibc immediately to protect it from a stack-based buffer overflow which was discovered on February 16, 2016.

Note: You only need to perform this update if you have a VPS or dedicated server. Customers with shared hosting accounts do not need to do anything.

Have GoDaddy update glibc for me

For $79, GoDaddy will update glibc for you. To buy this service, give us a call at (480) 463-8824.

Update glibc myself

  1. Connect to your server via SSH.
  2. Run one of the following commands, based on your OS:
    OS Do this...
    CentOS 6+
    Fedora 22+
    Red Hat 10+
    sudo yum -y update glibc glibc-common glibc-devel glibc-headers glibc-static glibc-utils nscd
    Ubuntu 12.04+
    sudo apt-get update && sudo apt-get install --only-upgrade libc6
    CentOS 5 Nothing - this OS is not affected
    Other OSes See Unsupported operating systems (GLIBC DNS vulnerability)

Your version of glibc should now be updated.

Next step


Var den här artikeln till hjälp?
Tack för din feedback. Ring vårt supportnummer eller starta chattalternativet ovan om du vill prata med en medarbetare på kundtjänst.
Vi är glada att vi kunde hjälpa till! Finns det något mer vi kan göra för dig?
Det var tråkigt att höra. Berätta vad som var krångligt eller varför lösningen inte hjälpte dig med problemet.