GLIBC DNS Vulnerability

You need to update your Linux server's installation of glibc immediately to protect it from a stack-based buffer overflow which was discovered on February 16, 2016.

Note: You only need to perform this update if you have a VPS or dedicated server. Customers with shared hosting accounts do not need to do anything.

Have GoDaddy update glibc for me

For $79, GoDaddy will update glibc for you. To buy this service, give us a call at (480) 463-8824.

Update glibc myself

  1. Connect to your server via SSH.
  2. Run one of the following commands, based on your OS:
    OS Do this...
    CentOS 6+
    Fedora 22+
    Red Hat 10+
    sudo yum -y update glibc glibc-common glibc-devel glibc-headers glibc-static glibc-utils nscd
    Ubuntu 12.04+
    sudo apt-get update && sudo apt-get install --only-upgrade libc6
    CentOS 5 Nothing - this OS is not affected
    Other OSes See Unsupported operating systems (GLIBC DNS vulnerability)

Your version of glibc should now be updated.

Next step


Was dit artikel nuttig?
Thanks for your feedback. To speak with a customer service representative, please use the support phone number or chat option above.
Fijn dat we konden helpen! Kunnen we nog iets voor je doen?
Dat spijt ons. Tell us what was confusing or why the solution didn’t solve your problem.