Article ID: 128375, created on Feb 18, 2016, last review on Feb 18, 2016

  • Applies to:
  • Plesk for Linux/Unix


A stack-based buffer overflow was found in libresolv in the code which performs dual A/AAAA DNS queries. A remote attacker could create specially crafted DNS responses which could cause libresolv to crash or potentially execute code with the permissions of the user running the library.

This issue has been rated as having Critical impact by Red Hat Product Security.

This issue did not affect the version of glibc shipped with Red Hat Enterprise Linux 5 or earlier. This issue affected the versions of glibc shipped with Red Hat Enterprise Linux 6 and 7.

Read more details on RedHat site


Operation System Vendors already released corresponding updates for the glibc library, please update your OS following standard procedure the as soon as possible:




Search Words


glibc stack-based buffer overflow in getaddrinfo()


CVE-2015-7547 glibc security


29d1e90fd304f01e6420fbe60f66f838 56797cefb1efc9130f7c48a7d1db0f0c a914db3fdc7a53ddcfd1b2db8f5a1b9c

Email subscription for changes to this article
Save as PDF