openSUSE Security Update : glibc (openSUSE-2016-233)

critical Nessus Plugin ID 88855

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for glibc fixes the following issues :

- errorcheck-mutex-no-elision.patch: Don't do lock elision on an error checking mutex (boo#956716, BZ #17514)

- reinitialize-dl_load_write_lock.patch: Reinitialize dl_load_write_lock on fork (boo#958315, BZ #19282)

- send-dg-buffer-overflow.patch: Fix getaddrinfo stack-based buffer overflow (CVE-2015-7547, boo#961721, BZ #18665)

- strftime-range-check.patch: Add range check on time fields (CVE-2015-8776, boo#962736, BZ #18985)

- hcreate-overflow-check.patch: Handle overflow in hcreate (CVE-2015-8778, boo#962737, BZ #18240)

- refactor-nan-parsing.patch: Refactor strtod parsing of NaN payloads (CVE-2014-9761, boo#962738, BZ #16962)

- catopen-unbound-alloca.patch: Fix unbound alloca in catopen (CVE-2015-8779, boo#962739, BZ #17905)

Solution

Update the affected glibc packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=956716

https://bugzilla.opensuse.org/show_bug.cgi?id=958315

https://bugzilla.opensuse.org/show_bug.cgi?id=961721

https://bugzilla.opensuse.org/show_bug.cgi?id=962736

https://bugzilla.opensuse.org/show_bug.cgi?id=962737

https://bugzilla.opensuse.org/show_bug.cgi?id=962738

https://bugzilla.opensuse.org/show_bug.cgi?id=962739

https://www.tenable.com/security/research/tra-2017-08

Plugin Details

Severity: Critical

ID: 88855

File Name: openSUSE-2016-233.nasl

Version: 2.15

Type: local

Agent: unix

Published: 2/19/2016

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment Azure, Nessus Agent, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:glibc, p-cpe:/a:novell:opensuse:glibc-32bit, p-cpe:/a:novell:opensuse:glibc-debuginfo, p-cpe:/a:novell:opensuse:glibc-debuginfo-32bit, p-cpe:/a:novell:opensuse:glibc-debugsource, p-cpe:/a:novell:opensuse:glibc-devel, p-cpe:/a:novell:opensuse:glibc-devel-32bit, p-cpe:/a:novell:opensuse:glibc-devel-debuginfo, p-cpe:/a:novell:opensuse:glibc-devel-debuginfo-32bit, p-cpe:/a:novell:opensuse:glibc-devel-static, p-cpe:/a:novell:opensuse:glibc-devel-static-32bit, p-cpe:/a:novell:opensuse:glibc-extra, p-cpe:/a:novell:opensuse:glibc-extra-debuginfo, p-cpe:/a:novell:opensuse:glibc-html, p-cpe:/a:novell:opensuse:glibc-i18ndata, p-cpe:/a:novell:opensuse:glibc-info, p-cpe:/a:novell:opensuse:glibc-locale, p-cpe:/a:novell:opensuse:glibc-locale-32bit, p-cpe:/a:novell:opensuse:glibc-locale-debuginfo, p-cpe:/a:novell:opensuse:glibc-locale-debuginfo-32bit, p-cpe:/a:novell:opensuse:glibc-obsolete, p-cpe:/a:novell:opensuse:glibc-obsolete-debuginfo, p-cpe:/a:novell:opensuse:glibc-profile, p-cpe:/a:novell:opensuse:glibc-profile-32bit, p-cpe:/a:novell:opensuse:glibc-utils, p-cpe:/a:novell:opensuse:glibc-utils-32bit, p-cpe:/a:novell:opensuse:glibc-utils-debuginfo, p-cpe:/a:novell:opensuse:glibc-utils-debuginfo-32bit, p-cpe:/a:novell:opensuse:glibc-utils-debugsource, p-cpe:/a:novell:opensuse:nscd, p-cpe:/a:novell:opensuse:nscd-debuginfo, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/18/2016

Reference Information

CVE: CVE-2014-9761, CVE-2015-7547, CVE-2015-8776, CVE-2015-8778, CVE-2015-8779

IAVA: 2016-A-0053

TRA: TRA-2017-08