Scientific Linux Security Update : glibc on SL6.x i386/x86_64 (20160216)

high Nessus Plugin ID 88797

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, potentially, execute code with the permissions of the user running the library. Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module. (CVE-2015-7547)

This update also fixes the following bugs :

- The dynamic loader has been enhanced to allow the loading of more shared libraries that make use of static thread local storage. While static thread local storage is the fastest access mechanism it may also prevent the shared library from being loaded at all since the static storage space is a limited and shared process-global resource. Applications which would previously fail with 'dlopen: cannot load any more object with static TLS' should now start up correctly.

- A bug in the POSIX realtime support would cause asynchronous I/O or certain timer API calls to fail and return errors in the presence of large thread-local storage data that exceeded PTHREAD_STACK_MIN in size (generally 16 KiB). The bug in librt has been corrected and the impacted APIs no longer return errors when large thread-local storage data is present in the application.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?28dbaa3a

https://www.tenable.com/security/research/tra-2017-08

Plugin Details

Severity: High

ID: 88797

File Name: sl_20160216_glibc_on_SL6_x.nasl

Version: 2.15

Type: local

Agent: unix

Published: 2/17/2016

Updated: 6/18/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:glibc-common, p-cpe:/a:fermilab:scientific_linux:glibc, p-cpe:/a:fermilab:scientific_linux:glibc-static, p-cpe:/a:fermilab:scientific_linux:glibc-utils, x-cpe:/o:fermilab:scientific_linux, p-cpe:/a:fermilab:scientific_linux:glibc-debuginfo, p-cpe:/a:fermilab:scientific_linux:nscd, p-cpe:/a:fermilab:scientific_linux:glibc-devel, p-cpe:/a:fermilab:scientific_linux:glibc-headers, p-cpe:/a:fermilab:scientific_linux:glibc-debuginfo-common

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/16/2016

Vulnerability Publication Date: 2/18/2016

Reference Information

CVE: CVE-2015-7547

IAVA: 2016-A-0053-S

TRA: TRA-2017-08