A new exploit vulnerability has been found: CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow .
According to the CVE, “A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, potentially, execute code with the permissions of the user running the library. Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module.”
RedHat has released a glibc update to patch this vulnerability.
To update glibc, run:
yum clean all && yum update "glibc*"
The update has only recently been pushed to yum mirrors, so if not available yet, you may need to wait until your closest mirrors are synced.