{"id":3155,"date":"2023-02-03T17:06:09","date_gmt":"2023-02-03T11:36:09","guid":{"rendered":"https:\/\/trysiteprice.com\/blog\/?p=3155"},"modified":"2024-02-18T19:05:46","modified_gmt":"2024-02-18T13:35:46","slug":"how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229","status":"publish","type":"post","link":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/","title":{"rendered":"How To Patch and Protect Linux Glibc Getaddrinfo Stack-based Buffer Overflow Zero Day Vulnerability CVE-2015-7547 and CVE-2015-5229"},"content":{"rendered":"<p>To patch and protect against the Linux Glibc Getaddrinfo Stack-based Buffer Overflow vulnerability (CVE-2015-7547 and CVE-2015-5229), you need to upgrade the glibc package to the fixed version.<\/p>\n<p>Here are the steps to upgrade glibc on Ubuntu\/Debian Linux:<\/p>\n<ol>\n<li>Update the package list:<\/li>\n<\/ol>\n<div class=\"bg-black mb-4 rounded-md\">\n<div class=\"flex items-center relative text-gray-200 bg-gray-800 px-4 py-2 text-xs font-sans\"><\/div>\n<div class=\"p-4 overflow-y-auto\"><code class=\"!whitespace-pre hljs language-sql\">sudo apt<span class=\"hljs-operator\">-<\/span><span class=\"hljs-keyword\">get<\/span> <span class=\"hljs-keyword\">update<\/span><br \/>\n<\/code><\/div>\n<\/div>\n<ol start=\"2\">\n<li>Upgrade glibc:<\/li>\n<\/ol>\n<div class=\"bg-black mb-4 rounded-md\">\n<div class=\"p-4 overflow-y-auto\"><code class=\"!whitespace-pre hljs language-csharp\">sudo apt-<span class=\"hljs-keyword\">get<\/span> upgrade libc6<br \/>\n<\/code><\/div>\n<\/div>\n<p>On Red Hat\/CentOS Linux, you can upgrade glibc by running the following command:<\/p>\n<div class=\"bg-black mb-4 rounded-md\">\n<div class=\"flex items-center relative text-gray-200 bg-gray-800 px-4 py-2 text-xs font-sans\"><\/div>\n<div class=\"p-4 overflow-y-auto\"><code class=\"!whitespace-pre hljs\">sudo yum upgrade glibc<br \/>\n<\/code><\/div>\n<\/div>\n<p>After upgrading, it&#8217;s recommended to restart any affected services or reboot the system to ensure that the new version of glibc is loaded and used.<\/p>\n<p>It&#8217;s important to note that the exact steps to upgrade glibc may vary depending on the distribution and version of Linux you are using. You should refer to the official documentation or consult a system administrator if you are unsure.<\/p>\n<p>(<a href=\"https:\/\/www.womenautoknow.com\/wild-west-of-canadian-pharmacies-tramadol-online\/\">Ultram<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To patch and protect against the Linux Glibc Getaddrinfo Stack-based Buffer Overflow vulnerability (CVE-2015-7547 and CVE-2015-5229), you need to upgrade the glibc package to the fixed version. Here are the steps to upgrade glibc on Ubuntu\/Debian Linux: Update the package list: sudo apt-get update Upgrade glibc: sudo apt-get upgrade libc6 On Red Hat\/CentOS Linux, you &#8230; <a title=\"How To Patch and Protect Linux Glibc Getaddrinfo Stack-based Buffer Overflow Zero Day Vulnerability CVE-2015-7547 and CVE-2015-5229\" class=\"read-more\" href=\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/\" aria-label=\"Read more about How To Patch and Protect Linux Glibc Getaddrinfo Stack-based Buffer Overflow Zero Day Vulnerability CVE-2015-7547 and CVE-2015-5229\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3155","post","type-post","status-publish","format-standard","hentry","category-best-tutorial"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How To Patch and Protect Linux Glibc Getaddrinfo Stack-based Buffer Overflow Zero Day Vulnerability CVE-2015-7547 and CVE-2015-5229 - TrySitePrice<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Patch and Protect Linux Glibc Getaddrinfo Stack-based Buffer Overflow Zero Day Vulnerability CVE-2015-7547 and CVE-2015-5229 - TrySitePrice\" \/>\n<meta property=\"og:description\" content=\"To patch and protect against the Linux Glibc Getaddrinfo Stack-based Buffer Overflow vulnerability (CVE-2015-7547 and CVE-2015-5229), you need to upgrade the glibc package to the fixed version. Here are the steps to upgrade glibc on Ubuntu\/Debian Linux: Update the package list: sudo apt-get update Upgrade glibc: sudo apt-get upgrade libc6 On Red Hat\/CentOS Linux, you ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/\" \/>\n<meta property=\"og:site_name\" content=\"TrySitePrice\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-03T11:36:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-18T13:35:46+00:00\" \/>\n<meta name=\"author\" content=\"Rahul Sahu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/\"},\"author\":{\"name\":\"Rahul Sahu\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/358e04eeea4281deacad2f30c58e67f4\"},\"headline\":\"How To Patch and Protect Linux Glibc Getaddrinfo Stack-based Buffer Overflow Zero Day Vulnerability CVE-2015-7547 and CVE-2015-5229\",\"datePublished\":\"2023-02-03T11:36:09+00:00\",\"dateModified\":\"2024-02-18T13:35:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/\"},\"wordCount\":147,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/#organization\"},\"articleSection\":[\"Best\/Tutorial\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/\",\"url\":\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/\",\"name\":\"How To Patch and Protect Linux Glibc Getaddrinfo Stack-based Buffer Overflow Zero Day Vulnerability CVE-2015-7547 and CVE-2015-5229 - TrySitePrice\",\"isPartOf\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/#website\"},\"datePublished\":\"2023-02-03T11:36:09+00:00\",\"dateModified\":\"2024-02-18T13:35:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trysiteprice.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Patch and Protect Linux Glibc Getaddrinfo Stack-based Buffer Overflow Zero Day Vulnerability CVE-2015-7547 and CVE-2015-5229\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#website\",\"url\":\"https:\/\/trysiteprice.com\/blog\/\",\"name\":\"TrySitePrice\",\"description\":\"Free Website Value Calculator Tool\",\"publisher\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trysiteprice.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#organization\",\"name\":\"TrySitePrice\",\"url\":\"https:\/\/trysiteprice.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trysiteprice.com\/blog\/wp-content\/uploads\/2021\/12\/cropped-trysiteprice-logo.png\",\"contentUrl\":\"https:\/\/trysiteprice.com\/blog\/wp-content\/uploads\/2021\/12\/cropped-trysiteprice-logo.png\",\"width\":395,\"height\":268,\"caption\":\"TrySitePrice\"},\"image\":{\"@id\":\"https:\/\/trysiteprice.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/358e04eeea4281deacad2f30c58e67f4\",\"name\":\"Rahul Sahu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/51f0f95f7b95665f62baed2211572165?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/51f0f95f7b95665f62baed2211572165?s=96&d=mm&r=g\",\"caption\":\"Rahul Sahu\"},\"sameAs\":[\"https:\/\/trysiteprice.com\/blog\"],\"url\":\"https:\/\/trysiteprice.com\/blog\/author\/rsahu4242_trysiteprice\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Patch and Protect Linux Glibc Getaddrinfo Stack-based Buffer Overflow Zero Day Vulnerability CVE-2015-7547 and CVE-2015-5229 - TrySitePrice","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/","og_locale":"en_US","og_type":"article","og_title":"How To Patch and Protect Linux Glibc Getaddrinfo Stack-based Buffer Overflow Zero Day Vulnerability CVE-2015-7547 and CVE-2015-5229 - TrySitePrice","og_description":"To patch and protect against the Linux Glibc Getaddrinfo Stack-based Buffer Overflow vulnerability (CVE-2015-7547 and CVE-2015-5229), you need to upgrade the glibc package to the fixed version. Here are the steps to upgrade glibc on Ubuntu\/Debian Linux: Update the package list: sudo apt-get update Upgrade glibc: sudo apt-get upgrade libc6 On Red Hat\/CentOS Linux, you ... Read more","og_url":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/","og_site_name":"TrySitePrice","article_published_time":"2023-02-03T11:36:09+00:00","article_modified_time":"2024-02-18T13:35:46+00:00","author":"Rahul Sahu","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/#article","isPartOf":{"@id":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/"},"author":{"name":"Rahul Sahu","@id":"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/358e04eeea4281deacad2f30c58e67f4"},"headline":"How To Patch and Protect Linux Glibc Getaddrinfo Stack-based Buffer Overflow Zero Day Vulnerability CVE-2015-7547 and CVE-2015-5229","datePublished":"2023-02-03T11:36:09+00:00","dateModified":"2024-02-18T13:35:46+00:00","mainEntityOfPage":{"@id":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/"},"wordCount":147,"commentCount":0,"publisher":{"@id":"https:\/\/trysiteprice.com\/blog\/#organization"},"articleSection":["Best\/Tutorial"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/","url":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/","name":"How To Patch and Protect Linux Glibc Getaddrinfo Stack-based Buffer Overflow Zero Day Vulnerability CVE-2015-7547 and CVE-2015-5229 - TrySitePrice","isPartOf":{"@id":"https:\/\/trysiteprice.com\/blog\/#website"},"datePublished":"2023-02-03T11:36:09+00:00","dateModified":"2024-02-18T13:35:46+00:00","breadcrumb":{"@id":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/trysiteprice.com\/blog\/how-to-patch-and-protect-linux-glibc-getaddrinfo-stack-based-buffer-overflow-zero-day-vulnerability-cve-2015-7547-and-cve-2015-5229\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trysiteprice.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How To Patch and Protect Linux Glibc Getaddrinfo Stack-based Buffer Overflow Zero Day Vulnerability CVE-2015-7547 and CVE-2015-5229"}]},{"@type":"WebSite","@id":"https:\/\/trysiteprice.com\/blog\/#website","url":"https:\/\/trysiteprice.com\/blog\/","name":"TrySitePrice","description":"Free Website Value Calculator Tool","publisher":{"@id":"https:\/\/trysiteprice.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trysiteprice.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/trysiteprice.com\/blog\/#organization","name":"TrySitePrice","url":"https:\/\/trysiteprice.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/trysiteprice.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/trysiteprice.com\/blog\/wp-content\/uploads\/2021\/12\/cropped-trysiteprice-logo.png","contentUrl":"https:\/\/trysiteprice.com\/blog\/wp-content\/uploads\/2021\/12\/cropped-trysiteprice-logo.png","width":395,"height":268,"caption":"TrySitePrice"},"image":{"@id":"https:\/\/trysiteprice.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/358e04eeea4281deacad2f30c58e67f4","name":"Rahul Sahu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/trysiteprice.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/51f0f95f7b95665f62baed2211572165?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/51f0f95f7b95665f62baed2211572165?s=96&d=mm&r=g","caption":"Rahul Sahu"},"sameAs":["https:\/\/trysiteprice.com\/blog"],"url":"https:\/\/trysiteprice.com\/blog\/author\/rsahu4242_trysiteprice\/"}]}},"_links":{"self":[{"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/posts\/3155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/comments?post=3155"}],"version-history":[{"count":2,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/posts\/3155\/revisions"}],"predecessor-version":[{"id":6995,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/posts\/3155\/revisions\/6995"}],"wp:attachment":[{"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/media?parent=3155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/categories?post=3155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trysiteprice.com\/blog\/wp-json\/wp\/v2\/tags?post=3155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}