CVE-2015-7547 - Patch Availability for Oracle Exalogic Linux Physical and Virtual Racks
(Doc ID 2108159.1)
Last updated on FEBRUARY 20, 2018
Applies to:Oracle Exalogic Elastic Cloud Software - Version 126.96.36.199.0 to 188.8.131.52.4
Oracle Virtual Server x86-64
This document provides a list of the all the Exalogic Elastic Cloud Software (EECS) releases affected by CVE-2015-7547 along with instructions on how to remediate the vulnerabilities on Compute Nodes and Guest vServers.
Below is overview about CVE-2015-7547 from National Vulnerability Database (NVD):
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
CVE-2015-7547 does NOT affect following configurations
- Exalogic compute nodes running Oracle Linux 5.x in a bare metal configuration
- Exalogic guest vServers running Oracle Linux 5.x in a bare metal configuration
- Exalogic compute nodes (dom0) on Virtual
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!
In this Document
|EXALOGIC PHYSICAL DEPLOYMENTS|
|COMPUTE NODES RUNNING ORACLE LINUX 6|
|EXALOGIC VIRTUAL DEPLOYMENTS|
|ORACLE LINUX 6.X|