GLIBC DNS Vulnerability

You need to update your Linux server's installation of glibc immediately to protect it from a stack-based buffer overflow which was discovered on February 16, 2016.

Note: You only need to perform this update if you have a VPS or dedicated server. Customers with shared hosting accounts do not need to do anything.

Have GoDaddy update glibc for me

For $79, GoDaddy will update glibc for you. To buy this service, give us a call at (480) 463-8824.

Update glibc myself

  1. Connect to your server via SSH.
  2. Run one of the following commands, based on your OS:
    OS Do this...
    CentOS 6+
    Fedora 22+
    Red Hat 10+
    sudo yum -y update glibc glibc-common glibc-devel glibc-headers glibc-static glibc-utils nscd
    Ubuntu 12.04+
    sudo apt-get update && sudo apt-get install --only-upgrade libc6
    CentOS 5 Nothing - this OS is not affected
    Other OSes See Unsupported operating systems (GLIBC DNS vulnerability)

Your version of glibc should now be updated.

Next step


이 글이 도움되었나요?
피드백을 보내주셔서 감사합니다. 고객 서비스 담당자에게 문의하시려면 지원 전화 번호 또는 위의 채팅 옵션을 이용하시기 바랍니다.
도와드릴 수 있어 기쁩니다! 더 도와 드릴 것이 있나요?
그것 유감스럽습니다. 혼동이 되었던 사항 또는 솔루션이 고객님의 문제를 해결하지 못했던 원인을 알려주세요.