Easyspace System Status

SERVICE UPDATE

Customers may notice site loading issues just now on our vhost16 platform (IP 62.233.121.40).

Our system administrators are aware of the problem and are investigating the issue now.

We are sorry for any inconvenience caused.

 

=================

The following information is for customers with Virtual or Dedicated servers only.

A critical vulnerability has been discovered within the Bash component of most Linux and Unix systems. This has been classed as severity one due to the fact that it allows system to be exploited remotely.

At this point a full patch is not available for all systems however CentOS, Debian and Ubuntu based systems have had updates made available.

============================

For CentOS version 4 and above have had a patch released today. In order to patch your CentOS environment you should follow the below steps:

1.         Log in to your Linux server via SSH

2.         Ensure you are logged in as a user who has ‘root’ privileges (For those running SUDO ensure you run the appropriate sudo commands with a SUDO enabled user)

3.         Run the command “yum update bash” on the command line

This will patch your system to the latest release of bash and negate the vulnerability.

If you have any issues patching your CentOS system then please raise a ticket via your control panel and we will work with you to address this.

Please be aware that at this point there have been no fixes released for legacy CentOS systems (CentOS 4 or earlier). Customers with these operating systems are recommended to monitor this status page for more information in due course.

============================

For Debian, and Ubuntu systems updated packages were released yesterday:
[Debian] – https://lists.debian.org/debian-security-announce/2014/msg00220.html
[Ubuntu] -  http://www.ubuntu.com/usn/usn-2362-1/

1.         Log in to your Linux server via SSH

2.         Ensure you are logged in as a user who has ‘root’ privileges (For those running SUDO ensure you run the appropriate sudo commands with a SUDO enabled user)

3.         Run the command “sudo apt-get update && sudo apt-get install –only-upgrade bash” on the command line.

This will patch your system to the latest release of bash and negate the vulnerability.

============================

If you should have any queries or concerns regarding how this vulnerability may affect you or your systems, please don’t hesitate to contact Support.