Scientific Linux Security Update : glibc on SL6.x i386/x86_64

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

It was discovered that the glibc dynamic linker/loader did not handle
the $ORIGIN dynamic string token set in the LD_AUDIT environment
variable securely. A local attacker with write access to a file system
containing setuid or setgid binaries could use this flaw to escalate
their privileges. (CVE-2010-3847)

It was discovered that the glibc dynamic linker/loader did not perform
sufficient safety checks when loading dynamic shared objects (DSOs) to
provide callbacks for its auditing API during the execution of
privileged programs. A local attacker could use this flaw to escalate
their privileges via a carefully-chosen system DSO library containing
unsafe constructors. (CVE-2010-3856)

This update also fixes the following bugs :

- Previously, the generic implementation of the strstr()
and memmem() functions did not handle certain periodic
patterns correctly and could find a false positive
match. This error has been fixed, and both functions now
work as expected. (BZ#643341)

- The 'TCB_ALIGNMENT' value has been increased to 32 bytes
to prevent applications from crashing during symbol
resolution on 64-bit systems with support for Intel AVX
vector registers. (BZ#643343)

See also :

http://www.nessus.org/u?c5cc6ce9
https://bugzilla.redhat.com/show_bug.cgi?id=643341
https://bugzilla.redhat.com/show_bug.cgi?id=643343

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60891 ()

Bugtraq ID:

CVE ID: CVE-2010-3847
CVE-2010-3856