{"id":80,"date":"2016-02-17T03:53:44","date_gmt":"2016-02-17T03:53:44","guid":{"rendered":"http:\/\/www.urolime.com\/blogs\/?p=80"},"modified":"2021-03-09T21:23:39","modified_gmt":"2021-03-09T15:53:39","slug":"critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547","status":"publish","type":"post","link":"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/","title":{"rendered":"Critical glibc vulnerability CVE-2015-7547"},"content":{"rendered":"<h2>What&#8217;s the glibc getaddrinfo\u00a0vulnerability?<\/h2>\n<p>Red Hat has updated <a href=\"https:\/\/access.redhat.com\/errata\/RHSA-2016:0176\">details<\/a> on the vulnerability.<\/p>\n<p>A stack-based buffer overflow was found in the way the libresolv library performed dual A\/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, potentially, execute code with the permissions of the user running the library. Note: this issue is only exposed when libresolv is called from the<br \/>\nnss_dns NSS service module. (CVE-2015-7547)<\/p>\n<h2>The technical explanation about the exploit<\/h2>\n<p>This is best provided by <a href=\"https:\/\/googleonlinesecurity.blogspot.be\/2016\/02\/cve-2015-7547-glibc-getaddrinfo-stack.html\">Google&#8217;s security team<\/a> themselves.<\/p>\n<p>glibc reserves 2048 bytes in the stack through alloca() for the DNS answer at_nss_dns_gethostbyname4_r() for hosting responses to a DNS query.<\/p>\n<p>Later on, at send_dg() and send_vc(), if the response is larger than 2048 bytes, a new buffer is allocated from the heap and all the information (buffer pointer, new buffer size and response size) is updated.<\/p>\n<p>Under certain conditions a mismatch between the stack buffer and the new heap allocation will happen. The final effect is that the stack buffer will be used to store the DNS response, even though the response is larger than the stack buffer and a heap buffer was allocated. This behavior leads to the stack buffer overflow.<\/p>\n<p>The vectors to trigger this buffer overflow are very common and can include ssh, sudo, and curl. We are confident that the exploitation vectors are diverse and widespread; we have not attempted to enumerate these vectors further.<\/p>\n<h2>Who&#8217;s vulnerable?<\/h2>\n<p>Quite a lof systems are potentially vulnerable to this exploit:<\/p>\n<p>All versions of glibc after 2.9 are vulnerable. Version 2.9 was introduced in May 2008.<\/p>\n<ul>\n<li>\n<blockquote><p>Red Hat Enterprise Linux 6 &amp; CentOS 6:\u00a0RHSA-2016:0175-1<\/p><\/blockquote>\n<\/li>\n<li>\n<blockquote><p>Red Hat Enterprise Linux 7 &amp; CentOS 7:\u00a0RHSA-2016:0176-1<\/p><\/blockquote>\n<\/li>\n<li>\n<blockquote><p>Debian Squeeze, Wheezy, Jessy &amp; Stretch:\u00a0<a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2015-7547\">CVE-2015-7547<\/a><\/p><\/blockquote>\n<\/li>\n<li>\n<blockquote><p>Ubuntu 12.04 &amp; 14.04:\u00a0<a href=\"http:\/\/people.canonical.com\/~ubuntu-security\/cve\/2015\/CVE-2015-7547.html\">CVE-2015-7547<\/a><\/p><\/blockquote>\n<\/li>\n<\/ul>\n<h2>What I need to do?<\/h2>\n<p>Due to the emerging risks outlined above, we strongly recommend that affected customers apply system updates to affected systems as soon as patches become available and as soon as operationally feasible. If you are unsure about patch availability for your system, visit the security section of your distribution\u2019s website.<\/p>\n<h2><strong>Fix for RHEL\/CentOS &amp; Ubuntu:<\/strong><\/h2>\n<h2>Step 1 :<\/h2>\n<p>Identify glibc version running on your server and see if its already patched or patch is available<strong>:<\/strong><\/p>\n<p><strong>RHEL\/CentOS:<\/strong><\/p>\n<p>Check existing glibc version:<\/p>\n<p><code># ldd \u2013version<\/code><\/p>\n<p>If you have 10&#8217;s or 100&#8217;s of servers to check you can use our <a href=\"http:\/\/www.urolime.com\/blogs\/87-2\/\">Ansible Playbook<\/a><\/p>\n<p>Check if patch is already applied to present package:<\/p>\n<p><code># rpm -qa glibc --changelog |head -20<\/code><\/p>\n<p>and you find below details:<\/p>\n<blockquote><p>* Thu Jan 14 2016 Carlos O&#8217;Donell &lt;carlos@redhat.com&gt; &#8211; 2.12-1.166.5<\/p>\n<p>&#8211; Fix CVE-2015-7547: getaddrinfo() stack-based buffer overflow (#1296028).<\/p><\/blockquote>\n<p>Check if your current package match version listed above (2.12-1.166.5)<\/p>\n<p><code># rpm -qa | grep glibc<\/code><\/p>\n<p><strong>Ubuntu:<\/strong><\/p>\n<p>Check if patch is available:<\/p>\n<p><code># apt-cache show libc6<\/code><\/p>\n<p><code># apt-get changelog libc-bin |grep CVE-2015<\/code><\/p>\n<p>With below result:<\/p>\n<blockquote><p>&#8211; debian\/patches\/any\/CVE-2015-7547-pre1.diff: fix memory leak in<\/p>\n<p>&#8211; debian\/patches\/any\/CVE-2015-7547-pre2.diff: fix memory leak in<\/p>\n<p>&#8211; debian\/patches\/any\/CVE-2015-7547.diff: fix buffer handling in<\/p>\n<p>&#8211; CVE-2015-7547<\/p><\/blockquote>\n<p>Or<\/p>\n<p><code># apt-get changelog libc-bin | head -20<\/code><\/p>\n<p>with below result:<\/p>\n<blockquote><p>* SECURITY UPDATE: glibc getaddrinfo stack-based buffer overflow<\/p>\n<p>&#8211; debian\/patches\/any\/CVE-2015-7547-pre1.diff: fix memory leak in<\/p>\n<p>resolv\/nss_dns\/dns-host.c.<\/p>\n<p>&#8211; debian\/patches\/any\/CVE-2015-7547-pre2.diff: fix memory leak in<\/p>\n<p>include\/resolv.h, resolv\/gethnamaddr.c, resolv\/nss_dns\/dns-canon.c,<\/p>\n<p>resolv\/nss_dns\/dns-host.c, resolv\/nss_dns\/dns-network.c,<\/p>\n<p>resolv\/res_query.c, resolv\/res_send.c.<\/p>\n<p>&#8211; debian\/patches\/any\/CVE-2015-7547.diff: fix buffer handling in<\/p>\n<p>resolv\/nss_dns\/dns-host.c, resolv\/res_query.c, resolv\/res_send.c.<\/p>\n<p>&#8211; CVE-2015-7547<\/p><\/blockquote>\n<h2>Step 2:<\/h2>\n<p>If you found that your existing version is not upgraded\/patched, proceed with upgrading your glibc packages<\/p>\n<p><strong>RHEL\/CentOS:<\/strong><\/p>\n<p><code># yum clean all<\/code><\/p>\n<p><code># yum update glibc<\/code><\/p>\n<p><strong>Ubuntu:<\/strong><\/p>\n<p><code># apt-get --only-upgrade install libc-bin<\/code><\/p>\n<p>Or<\/p>\n<p><code># apt-get upgrade<\/code><\/p>\n<h2>Step 3:<\/h2>\n<p>Since glibc used by several services, and complete the patch deployment process, you need to either <strong>reboot\u00a0<\/strong>your server (Recommended)<\/p>\n<p>Or<\/p>\n<p><code># lsof | awk &#039;\/libc-\/ {print $1}&#039; | sort -u)<\/code><\/p>\n<p>and restart the listed services from above command output.<\/p>\n<p><strong>If you need any assistance please contact us on security[at]urolime[dot]com, we provide FREE support to implement this patch up to 2 Servers.<\/strong><\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_80\" class=\"pvc_stats all  \" data-element-id=\"80\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>What&#8217;s the glibc getaddrinfo\u00a0vulnerability? Red Hat has updated details on the vulnerability. A stack-based buffer overflow was found in the way the libresolv library performed dual A\/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, potentially, execute code with the permissions of the user [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_80\" class=\"pvc_stats all  \" data-element-id=\"80\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":82,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","footnotes":""},"categories":[1],"tags":[],"class_list":["post-80","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>glibc vulnerability (CVE-2015-7547)<\/title>\n<meta name=\"description\" content=\"Patching glibc Vulnrability\u00a0CVE-2015-7547\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"glibc vulnerability (CVE-2015-7547)\" \/>\n<meta property=\"og:description\" content=\"Patching glibc Vulnrability\u00a0CVE-2015-7547\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/\" \/>\n<meta property=\"og:site_name\" content=\"Urolime Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-17T03:53:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-09T15:53:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/02\/glibc-exploit.png\" \/>\n\t<meta property=\"og:image:width\" content=\"532\" \/>\n\t<meta property=\"og:image:height\" content=\"243\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Urolime Technologies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Urolime Technologies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/\"},\"author\":{\"name\":\"Urolime Technologies\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\"},\"headline\":\"Critical glibc vulnerability CVE-2015-7547\",\"datePublished\":\"2016-02-17T03:53:44+00:00\",\"dateModified\":\"2021-03-09T15:53:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/\"},\"wordCount\":670,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/02\/glibc-exploit.png\",\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/\",\"name\":\"glibc vulnerability (CVE-2015-7547)\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/02\/glibc-exploit.png\",\"datePublished\":\"2016-02-17T03:53:44+00:00\",\"dateModified\":\"2021-03-09T15:53:39+00:00\",\"description\":\"Patching glibc Vulnrability\u00a0CVE-2015-7547\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/#primaryimage\",\"url\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/02\/glibc-exploit.png\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/02\/glibc-exploit.png\",\"width\":532,\"height\":243,\"caption\":\"glibc exploit\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#website\",\"url\":\"https:\/\/www.urolime.com\/blogs\/\",\"name\":\"Urolime Blogs\",\"description\":\"The place for DevOps, Cloud, Kubernetes News and Updates\",\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.urolime.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#organization\",\"name\":\"Urolime Blogs\",\"url\":\"https:\/\/www.urolime.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2021\/06\/cropped-250-x250.jpg\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2021\/06\/cropped-250-x250.jpg\",\"width\":250,\"height\":73,\"caption\":\"Urolime Blogs\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\",\"name\":\"Urolime Technologies\",\"description\":\"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.\",\"sameAs\":[\"https:\/\/www.urolime.com\/\"],\"url\":\"https:\/\/www.urolime.com\/blogs\/author\/blogadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"glibc vulnerability (CVE-2015-7547)","description":"Patching glibc Vulnrability\u00a0CVE-2015-7547","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/","og_locale":"en_US","og_type":"article","og_title":"glibc vulnerability (CVE-2015-7547)","og_description":"Patching glibc Vulnrability\u00a0CVE-2015-7547","og_url":"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/","og_site_name":"Urolime Blogs","article_published_time":"2016-02-17T03:53:44+00:00","article_modified_time":"2021-03-09T15:53:39+00:00","og_image":[{"width":532,"height":243,"url":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/02\/glibc-exploit.png","type":"image\/png"}],"author":"Urolime Technologies","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Urolime Technologies","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/#article","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/"},"author":{"name":"Urolime Technologies","@id":"https:\/\/www.urolime.com\/blogs\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c"},"headline":"Critical glibc vulnerability CVE-2015-7547","datePublished":"2016-02-17T03:53:44+00:00","dateModified":"2021-03-09T15:53:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/"},"wordCount":670,"commentCount":0,"publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/02\/glibc-exploit.png","articleSection":["General"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/","url":"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/","name":"glibc vulnerability (CVE-2015-7547)","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/#primaryimage"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/02\/glibc-exploit.png","datePublished":"2016-02-17T03:53:44+00:00","dateModified":"2021-03-09T15:53:39+00:00","description":"Patching glibc Vulnrability\u00a0CVE-2015-7547","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/critical-vulnerability-in-glibc-getaddrinfo-cve-2015-7547\/#primaryimage","url":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/02\/glibc-exploit.png","contentUrl":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/02\/glibc-exploit.png","width":532,"height":243,"caption":"glibc exploit"},{"@type":"WebSite","@id":"https:\/\/www.urolime.com\/blogs\/#website","url":"https:\/\/www.urolime.com\/blogs\/","name":"Urolime Blogs","description":"The place for DevOps, Cloud, Kubernetes News and Updates","publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.urolime.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.urolime.com\/blogs\/#organization","name":"Urolime Blogs","url":"https:\/\/www.urolime.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2021\/06\/cropped-250-x250.jpg","contentUrl":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2021\/06\/cropped-250-x250.jpg","width":250,"height":73,"caption":"Urolime Blogs"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.urolime.com\/blogs\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c","name":"Urolime Technologies","description":"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.","sameAs":["https:\/\/www.urolime.com\/"],"url":"https:\/\/www.urolime.com\/blogs\/author\/blogadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/posts\/80","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/comments?post=80"}],"version-history":[{"count":16,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/posts\/80\/revisions"}],"predecessor-version":[{"id":1794,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/posts\/80\/revisions\/1794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/media\/82"}],"wp:attachment":[{"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/media?parent=80"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/categories?post=80"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/tags?post=80"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}