Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.122033
Category:Oracle Linux Local Security Checks
Title:Oracle: Security Advisory (ELSA-2011-1526)
Summary:The remote host is missing an update for the 'glibc' package(s) announced via the ELSA-2011-1526 advisory.
Description:Summary:
The remote host is missing an update for the 'glibc' package(s) announced via the ELSA-2011-1526 advisory.

Vulnerability Insight:
[2.12-1.47]
- Don't start AVC thread until credentials are installed (#700507)

[2.12-1.46]
- Update systemtaparches

[2.12-1.45]
- Update configure script

[2.12-1.44]
- Add gdb hooks (#711927)

[2.12-1.43]
- Don't assume AT_PAGESIZE is always available (#739184)
- Define IP_MULTICAST_ALL (#738763)

[2.12-1.42]
- Avoid race between {,__de}allocate_stack and __reclaim_stacks during
fork (#738665)

[2.12-1.41]
- Locale-independent parsing in libintl (#737778)

[2.12-1.40]
- Change setgroups to affect all the threads in the process (#736346)

[2.12-1.39]
- Make sure AVC thread has capabilities (#700507)
- Fix memory leak in dlopen with RTLD_NOLOAD (#699724)

[2.12-1.38]
- Build libresolv with stack protector (#730379)

[2.12-1.37]
- Maintain stack alignment when cancelling threads (#731042)

[2.12-1.36]
- Fix missing debuginfo (#729036)

[2.12-1.35]
- Report write error in addmnt even for cached streams (#688980,
CVE-2011-1089)
- Handle Lustre filesystem (#712248)

[2.12-1.34]
- Query NIS domain only when needed (#718057)
- Update: Use mmap for allocation of buffers used for __abort_msg
(#676591)

[2.12-1.33]
- Don't use gethostbyaddr to determine canonical name (#714823)

[2.12-1.32]
- ldd: never run file directly (#713134)

[2.12-1.31]
- Support Intel processor model 6 and model 0x2c (#695595)
- Optimize memcpy for SSSE3 (#695812)
- Optimize strlen for SSE2 (#695963)

[2.12-1.30]
- Support f_flags in Linux statfs implementation (#711987)

[2.12-1.29]
- Avoid overriding CFLAGS (#706903)

[2.12-1.28]
- Use mmap for allocation of buffers used for __abort_msg (#676591)

[2.12-1.27]
- Fix PLT use due to __libc_alloca_cutoff
- Schedule nscd cache pruning more accurately from re-added values
(#703481)
- Fix POWER4 optimized strncmp to not read past differing bytes
(#694386)

[2.12-1.26]
- Create debuginfo-common on biarch platforms (#676467)
- Use Rupee sign in Indian locales (#692838)
- Signal temporary host lookup errors in nscd as such to the requester
(#703480)
- Define initgroups callback for nss_files (#705465)

Affected Software/OS:
'glibc' package(s) on Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-5064
http://reverse.lostrealm.com/protect/ldd.html
http://www.catonmat.net/blog/ldd-arbitrary-code-execution/
https://bugzilla.redhat.com/show_bug.cgi?id=531160
https://bugzilla.redhat.com/show_bug.cgi?id=682998
http://openwall.com/lists/oss-security/2011/03/07/10
http://openwall.com/lists/oss-security/2011/03/07/7
http://openwall.com/lists/oss-security/2011/03/08/2
http://openwall.com/lists/oss-security/2011/03/07/13
http://openwall.com/lists/oss-security/2011/03/08/1
http://openwall.com/lists/oss-security/2011/03/08/10
http://openwall.com/lists/oss-security/2011/03/08/3
http://openwall.com/lists/oss-security/2011/03/08/7
http://www.redhat.com/support/errata/RHSA-2011-1526.html
Common Vulnerability Exposure (CVE) ID: CVE-2011-1089
46740
http://www.securityfocus.com/bid/46740
MDVSA-2011:178
http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
MDVSA-2011:179
http://www.mandriva.com/security/advisories?name=MDVSA-2011:179
RHSA-2011:1526
[oss-security] 20110303 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/04/11
[oss-security] 20110303 Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/04/9
[oss-security] 20110304 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/04/10
http://openwall.com/lists/oss-security/2011/03/04/12
[oss-security] 20110305 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/05/3
http://openwall.com/lists/oss-security/2011/03/05/7
[oss-security] 20110307 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/07/9
[oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/14/16
http://openwall.com/lists/oss-security/2011/03/14/5
http://openwall.com/lists/oss-security/2011/03/14/7
[oss-security] 20110315 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/15/6
[oss-security] 20110322 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/22/4
http://openwall.com/lists/oss-security/2011/03/22/6
[oss-security] 20110331 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/03/31/3
http://openwall.com/lists/oss-security/2011/03/31/4
[oss-security] 20110401 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
http://openwall.com/lists/oss-security/2011/04/01/2
http://sourceware.org/bugzilla/show_bug.cgi?id=12625
https://bugzilla.redhat.com/show_bug.cgi?id=688980
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.