Rapid7 Vulnerability & Exploit Database

RHSA-2016:0176: glibc security and bug fix update

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

RHSA-2016:0176: glibc security and bug fix update

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
02/16/2016
Created
07/25/2018
Added
02/17/2016
Modified
03/21/2018

Description

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.A stack-based buffer overflow was found in the way the libresolv libraryperformed dual A/AAAA DNS queries. A remote attacker could create aspecially crafted DNS response which could cause libresolv to crash or,potentially, execute code with the permissions of the user running thelibrary. Note: this issue is only exposed when libresolv is called from thenss_dns NSS service module. (CVE-2015-7547)It was discovered that the calloc implementation in glibc could returnmemory areas which contain non-zero bytes. This could result in unexpectedapplication behavior such as hangs or crashes. (CVE-2015-5229)The CVE-2015-7547 issue was discovered by the Google Security Team and RedHat. Red Hat would like to thank Jeff Layton for reporting theCVE-2015-5229 issue.This update also fixes the following bugs:With this update, the M_TRIM_THRESHOLD method is extended to apply to allmemory pools, which improves performance for threads with very high amountsof free calls and limits the number of "madvise" system calls. The changealso increases the total transient memory usage by processes because thetrim threshold must be reached before memory can be freed.To return to the previous behavior, you can either set M_TRIM_THRESHOLDusing the "mallopt" function, or set the MALLOC_TRIM_THRESHOLD environmentvariable to 0. (BZ#1298930)All glibc users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues.

Solution(s)

  • redhat-upgrade-glibc
  • redhat-upgrade-glibc-common
  • redhat-upgrade-glibc-debuginfo
  • redhat-upgrade-glibc-debuginfo-common
  • redhat-upgrade-glibc-devel
  • redhat-upgrade-glibc-headers
  • redhat-upgrade-glibc-static
  • redhat-upgrade-glibc-utils
  • redhat-upgrade-nscd

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;