CVE-2015-7547 - Patch Availability for Oracle Exalogic Linux Physical and Virtual Racks

(Doc ID 2108159.1)

Last updated on FEBRUARY 20, 2018

Applies to:

Oracle Exalogic Elastic Cloud Software - Version to
Linux x86-64
Oracle Virtual Server x86-64


This document provides a list of the all the Exalogic Elastic Cloud Software (EECS) releases affected by CVE-2015-7547 along with instructions on how to remediate the vulnerabilities on Compute Nodes and Guest vServers.

Below is overview about CVE-2015-7547 from National Vulnerability Database (NVD):

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the NSS module.


CVE-2015-7547 does NOT affect following configurations

  • Exalogic compute nodes running Oracle Linux 5.x in a bare metal configuration

  • Exalogic guest vServers running Oracle Linux 5.x in a bare metal configuration

  • Exalogic compute nodes (dom0) on Virtual


Sign In with your My Oracle Support account

Don't have a My Oracle Support account? Click to get started

My Oracle Support provides customers with access to over a
Million Knowledge Articles and hundreds of Community platforms