Critical Linux Vulnerability Alert: glibc

A critical security vulnerability has been announced in the GNU glibc library.

This vulnerability affects virtually all Linux servers. The glibc library contains a buffer overflow vulnerability in the DNS resolver, which may allow a remote attacker to execute arbitrary code and remotely take control of your server.

Fixing this vulnerability requires updating “glibc” packages and restarting the service.

All Pantek Support Engineers have been advised of this issue, and trained in the appropriate response procedure. If you would like our assistance to fix this vulnerability, please open a ticket with us a https://portal.pantek.com/clientarea.php

Pantek clients who have purchased Pantek Managed Service Plans will receive a separate notification, as management of these third-party security issues is included without incurring extra charges. If you’re interested in upgrading your Managed Service Plan, more information is available here: https://www.pantek.com/linux-server-management/

You can read more about this vulnerability here:
http://www.kb.cert.org/vuls/id/457759

Richard Zack

Richard Zack

Richard is an entrepreneur, manager and Open Source Software professional with over 20 years of Linux and Open Source Software experience. The original founder of Pantek, Richard built Pantek from the ground up, and as Chief Technical Officer he leads all technology teams and operations of Pantek. Richard's career includes extensive experience with acquisitions, technology and staff management, business development, infrastructure engineering, and system administration. Richard is a guru with most Linux and Open Source Software and platforms, and is a Red Hat Certified Engineer.
Richard Zack

Latest posts by Richard Zack (see all)