A vulnerability that affects most Linux based operating systems has been confirmed and patches are now available. If you are a managed services client, your system has already been patched as our technicians finished patching systems 15 minutes ago. For clients without managed services, we highly recommend patching your Linux system without delay. Failure to do so may result in a compromised system. Mean Servers can assist, see below!

If you need assistance updating and patching your system, please open a ticket with the billing department. For the next 7 days, we will upgrade and patch your entire system for just $20, normal system update and patching price is $49. Mention this announcement to receive the discount, good until February 23, 2016 at midnight.

"The vulnerability (CVE 2015-7547), a stack-based buffer overflow in the getaddrinfo() function in the glibc DNS client-side resolver, has already been patched. Anyone using glibc 2.9 and later -- since 2.9 was released in May 2008, that means pretty much anyone using glibc -- should patch as soon as possible. Red Hat Enterprise Linux 5 has glibc 2.5, so it isn't vulnerable, but Red Hat Enterprise Linux 6 (glibc 2.12), Red Hat Enterprise Linux 7 (glibc 2.17), Debian squeeze (glibc 2.11), Debian wheezy (glibc 2.13), and Debian jessie (glibc 2.19) are all affected." -Patch now! Unix bug puts Linux, Android, and iOS systems at risk, InfoWorld


Tuesday, February 16, 2016





« Back