ScaleArc Support Center

Welcome back, guest

Register or login below.



Critical: glibc security and bug fix update - CVE-2015-7547

Critical: glibc security and bug fix update - CVE-2015-7547

Release Classification Level DB Platform Categories
All Solution ALL Security



GNU glibc contains a buffer overflow vulnerability in the DNS resolver, which may allow a remote attacker to execute arbitrary code.

More details and analysis are available in the patch announcement from glibc developers.

The getaddrinfo() function allows a buffer overflow condition in which arbitrary code may be executed. The impact may vary depending on if the use case is local or remote.

CWE-121: Stack-based Buffer Overflow - CVE-2015-7547
According to glibc developers, the vulnerable code was initially added in May 2008 as part of the development forglibc 2.9. All versions from 2.9 (originally released November 2008) to 2.22 appear to be affected.



DO NOT perform an update of the entire system.

Login to ScaleArc box with idb user and download the following rpms in /tmp directory and Verify your exisiting version of glibc

[idb@scalearc-1 tmp]$ rpm -qa |grep glibc

cd /tmp

curl -O ""
curl -O ""

Verify the md5sum :
4b5abcc64f1577bcc891726d47ae0d7c glibc-2.12-1.166.el6_7.7.x86_64.rpm
a5d2e83706d8bc1be1e2f09f320bd9c6 glibc-common-2.12-1.166.el6_7.7.x86_64.rpm

Install the rpms :
sudo rpm -Uvh glibc*

Verify the glibc version

[idb@scalearc-1 tmp]$ rpm -qa |grep glibc


If you are experiencing issues with ScaleArc or with any of it's features, please contact ScaleArc Support. We are available 24x7 by phone at 855 800 7225 or +1 408 412 7315. For general support inquiries, you can also e-mail us at

Copyright ©2014 ScaleArc, Inc. All rights reserved. Contact Support |  Contact ScaleArcFeedback

2901 Tasman Drive Santa Clara, CA 95054 | Email:

Subscribe to this article to get an email notification when it is updated.
Share this: