How To Patch and Protect Linux Glibc Getaddrinfo Stack-based Buffer Overflow Zero Day Vulnerability CVE-2015-7547 and CVE-2015-5229

To patch and protect against the Linux Glibc Getaddrinfo Stack-based Buffer Overflow vulnerability (CVE-2015-7547 and CVE-2015-5229), you need to upgrade the glibc package to the fixed version.

Here are the steps to upgrade glibc on Ubuntu/Debian Linux:

  1. Update the package list:
sudo apt-get update
  1. Upgrade glibc:
sudo apt-get upgrade libc6

On Red Hat/CentOS Linux, you can upgrade glibc by running the following command:

sudo yum upgrade glibc

After upgrading, it’s recommended to restart any affected services or reboot the system to ensure that the new version of glibc is loaded and used.

It’s important to note that the exact steps to upgrade glibc may vary depending on the distribution and version of Linux you are using. You should refer to the official documentation or consult a system administrator if you are unsure.

(Ultram)

Leave a Comment