[El-errata] New glibc updates available via Ksplice (ELSA-2016-0176)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Tue Feb 16 17:07:29 PST 2016
Synopsis: ELSA-2016-0176 can now be patched using Ksplice
CVEs: CVE-2015-7547
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Security Advisory, ELSA-2016-0176.
INSTALLING THE UPDATES
We recommend that all users of Ksplice on OL 7 install these updates.
You can install these updates by running:
# ksplice -y user upgrade
32-bit applications should be restarted after upgrading the on-disk
glibc RPMs and statically linked applications using
glibc should be rebuilt to include these fixes.
DESCRIPTION
* CVE-2015-7547: Remote code execution in glibc DNS resolver.
A stack-based buffer overflow in the glibc libresolv library could be
triggered by a remote attacker with specially crafted DNS responses.
This could result in an application crash, or potentially allow
execution of arbitrary code with permissions of the user running the
library.
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata
mailing list