Critical glibc Vulnerability Patched on all SiteGround Servers
Security
•
Service Updates
•
Critical glibc Vulnerability Patched on all SiteGround Servers
Hours ago a critical vulnerability in the GNU C Library (glibc) was announced alongside a proof of concept for the attack. This library is one of the main components in the majority of Linux distributions (if not all) including those, used for server OS’es. Without getting into too much technicalities, the exploit allows an attacker to remotely execute code by following a simple link. That’s one of the most severe vulnerabilities discovered in the recent years and potentially affects pretty much any Linux server out there.
Given that all SiteGround servers run on CentOS – a Linux distribution, we took immediate measures to secure our machines. I am happy to announce that a patch has been applied on all our servers and our customers are well protected against this security threat!
Thanks!
Please check your email to confirm your subscription.


Sign Up For More Awesome Content!
Sign up for our newsletters with the latest content and offer updates. You can unsubscribe at any time.
Google reCAPTCHA used. Privacy Policy and Terms of Service apply
var blog_subscribing_started = false;
var blog_subscribing_rendered = false;
var formSubmitBtn = $(‘form.subscribe-form’).find(‘.btn-submit’);
$(document).ready(function(ev) {
formSubmitBtn.on(‘click’, function(ev) {
ev.preventDefault();
let form = $(this).closest(‘.subscribe-form’);
if (blog_subscribing_started || $(this).hasClass(‘btn-disabled’)) {
return;
}
blog_subscribing_started = true;
blog_subscription_hide_errors(form);
grecaptcha.ready(function() {
grecaptcha.execute(r3k, {action: ‘submit’}).then(function(token) {
document.querySelectorAll(‘#rt3’).forEach(function(e) { e.value = token; })
blog_subscription_send_form(form);
});
});
});
})
function renderRecaptcha2(form) {
if (!$(‘#recaptcha2_challenge’).length) {
let verifyCallback = function(response) {
document.querySelectorAll(‘#rt2’).forEach(function(e) { e.value = token; })
};
$(‘