glibc Library - Stack-Based Buffer Overflow Vulnerability

Number: AV16-031
Date: 18 February 2016


The purpose of this advisory is to bring attention to a vulnerability discovered in the glibc library of code, a key component of most Linux distributions.


GNU C Library (glibc) is a collection of open source code that powers standalone applications and most Linux distributions.

The vulnerability in glibc relates to a stack-based buffer overflow in the glibc DNS client-side resolver that puts Linux machines at risk for remote code execution. The flaw is triggered when the getaddrinfo() library function, which is responsible for performing domain-name lookups, is used.

Affected Software:  All versions of glibc Version 2.9 to 2.22 are vulnerable.

CVE Reference: CVE-2015-7547

Suggested action

CCIRC recommends that system administrators test and deploy the vendor-released updates to affected applications accordingly.


Note to Readers

In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.

Please note, CCIRC PGP key has recently been updated.

For general information, please contact Public Safety Canada's Public Affairs division at:

Telephone: 613-944-4875 or 1-800-830-3118
Fax: 613-998-9589

Date modified: