Lucene search

K
nessusThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.REDHAT-RHSA-2017-1479.NASL
HistoryJun 20, 2017 - 12:00 a.m.

RHEL 6 / 7 : glibc (RHSA-2017:1479) (Stack Clash)

2017-06-2000:00:00
This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
47

An update for glibc is now available for Red Hat Enterprise Linux 5 Extended Lifecycle Support, Red Hat Enterprise Linux 5.9 Long Life, Red Hat Enterprise Linux 6.2 Advanced Update Support, Red Hat Enterprise Linux 6.4 Advanced Update Support, Red Hat Enterprise Linux 6.5 Advanced Update Support, Red Hat Enterprise Linux 6.5 Telco Extended Update Support, Red Hat Enterprise Linux 6.6 Advanced Update Support, Red Hat Enterprise Linux 6.6 Telco Extended Update Support, Red Hat Enterprise Linux 6.7 Extended Update Support, and Red Hat Enterprise Linux 7.2 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.

Security Fix(es) :

  • A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366)

Red Hat would like to thank Qualys Research Labs for reporting this issue.

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Red Hat Security Advisory RHSA-2017:1479. The text 
# itself is copyright (C) Red Hat, Inc.
#

include("compat.inc");

if (description)
{
  script_id(100890);
  script_version("3.23");
  script_cvs_date("Date: 2019/10/24 15:35:43");

  script_cve_id("CVE-2017-1000366");
  script_xref(name:"RHSA", value:"2017:1479");

  script_name(english:"RHEL 6 / 7 : glibc (RHSA-2017:1479) (Stack Clash)");
  script_summary(english:"Checks the rpm output for the updated packages");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Red Hat host is missing one or more security updates."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"An update for glibc is now available for Red Hat Enterprise Linux 5
Extended Lifecycle Support, Red Hat Enterprise Linux 5.9 Long Life,
Red Hat Enterprise Linux 6.2 Advanced Update Support, Red Hat
Enterprise Linux 6.4 Advanced Update Support, Red Hat Enterprise Linux
6.5 Advanced Update Support, Red Hat Enterprise Linux 6.5 Telco
Extended Update Support, Red Hat Enterprise Linux 6.6 Advanced Update
Support, Red Hat Enterprise Linux 6.6 Telco Extended Update Support,
Red Hat Enterprise Linux 6.7 Extended Update Support, and Red Hat
Enterprise Linux 7.2 Extended Update Support.

Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.

The glibc packages provide the standard C libraries (libc), POSIX
thread libraries (libpthread), standard math libraries (libm), and the
name service cache daemon (nscd) used by multiple programs on the
system. Without these libraries, the Linux system cannot function
correctly.

Security Fix(es) :

* A flaw was found in the way memory was being allocated on the stack
for user space binaries. If heap (or different memory region) and
stack memory regions were adjacent to each other, an attacker could
use this flaw to jump over the stack guard gap, cause controlled
memory corruption on process stack or the adjacent memory region, and
thus increase their privileges on the system. This is glibc-side
mitigation which blocks processing of LD_LIBRARY_PATH for programs
running in secure-execution mode and reduces the number of allocations
performed by the processing of LD_AUDIT, LD_PRELOAD, and
LD_HWCAP_MASK, making successful exploitation of this issue more
difficult. (CVE-2017-1000366)

Red Hat would like to thank Qualys Research Labs for reporting this
issue."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://access.redhat.com/security/vulnerabilities/stackguard"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://access.redhat.com/errata/RHSA-2017:1479"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://access.redhat.com/security/cve/cve-2017-1000366"
  );
  script_set_attribute(attribute:"solution", value:"Update the affected packages.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploited_by_malware", value:"true");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glibc");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glibc-common");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glibc-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glibc-debuginfo-common");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glibc-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glibc-headers");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glibc-static");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glibc-utils");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nscd");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5.9");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6.2");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6.4");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6.5");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6.6");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6.7");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.2");

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/06/19");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/06/19");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/06/20");
  script_set_attribute(attribute:"in_the_news", value:"true");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Red Hat Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
os_ver = os_ver[1];
if (! preg(pattern:"^(5|6\.2|6\.4|6\.5|6\.6|6\.7|7\.2)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 5.x / 6.2 / 6.4 / 6.5 / 6.6 / 6.7 / 7.2", "Red Hat " + os_ver);

if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);

yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
if (!empty_or_null(yum_updateinfo)) 
{
  rhsa = "RHSA-2017:1479";
  yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
  if (!empty_or_null(yum_report))
  {
    security_report_v4(
      port       : 0,
      severity   : SECURITY_HOLE,
      extra      : yum_report 
    );
    exit(0);
  }
  else
  {
    audit_message = "affected by Red Hat security advisory " + rhsa;
    audit(AUDIT_OS_NOT, audit_message);
  }
}
else
{  sp = get_kb_item("Host/RedHat/minor_release");
  if (isnull(sp)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");

  flag = 0;
  if (rpm_check(release:"RHEL6", sp:"7", reference:"glibc-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"6", cpu:"i686", reference:"glibc-2.12-1.149.el6_6.12")) flag++;
  if (rpm_check(release:"RHEL6", sp:"4", cpu:"i686", reference:"glibc-2.12-1.107.el6_4.10")) flag++;
  if (rpm_check(release:"RHEL6", sp:"2", cpu:"i686", reference:"glibc-2.12-1.47.el6_2.18")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"i686", reference:"glibc-2.12-1.132.el6_5.9")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"s390", reference:"glibc-2.5-123.el5_11.4")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"s390x", reference:"glibc-2.5-123.el5_11.4")) flag++;
  if (rpm_check(release:"RHEL6", sp:"6", cpu:"x86_64", reference:"glibc-2.12-1.149.el6_6.12")) flag++;
  if (rpm_check(release:"RHEL6", sp:"4", cpu:"x86_64", reference:"glibc-2.12-1.107.el6_4.10")) flag++;
  if (rpm_check(release:"RHEL6", sp:"2", cpu:"x86_64", reference:"glibc-2.12-1.47.el6_2.18")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"x86_64", reference:"glibc-2.12-1.132.el6_5.9")) flag++;
  if (rpm_check(release:"RHEL6", sp:"7", cpu:"i686", reference:"glibc-common-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"7", cpu:"s390x", reference:"glibc-common-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"s390x", reference:"glibc-common-2.5-123.el5_11.4")) flag++;
  if (rpm_check(release:"RHEL6", sp:"6", cpu:"x86_64", reference:"glibc-common-2.12-1.149.el6_6.12")) flag++;
  if (rpm_check(release:"RHEL6", sp:"4", cpu:"x86_64", reference:"glibc-common-2.12-1.107.el6_4.10")) flag++;
  if (rpm_check(release:"RHEL6", sp:"7", cpu:"x86_64", reference:"glibc-common-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"2", cpu:"x86_64", reference:"glibc-common-2.12-1.47.el6_2.18")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"x86_64", reference:"glibc-common-2.12-1.132.el6_5.9")) flag++;
  if (rpm_check(release:"RHEL6", sp:"7", reference:"glibc-debuginfo-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"6", cpu:"i686", reference:"glibc-debuginfo-2.12-1.149.el6_6.12")) flag++;
  if (rpm_check(release:"RHEL6", sp:"4", cpu:"i686", reference:"glibc-debuginfo-2.12-1.107.el6_4.10")) flag++;
  if (rpm_check(release:"RHEL6", sp:"2", cpu:"i686", reference:"glibc-debuginfo-2.12-1.47.el6_2.18")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"i686", reference:"glibc-debuginfo-2.12-1.132.el6_5.9")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"s390", reference:"glibc-debuginfo-2.5-123.el5_11.4")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"s390x", reference:"glibc-debuginfo-2.5-123.el5_11.4")) flag++;
  if (rpm_check(release:"RHEL6", sp:"6", cpu:"x86_64", reference:"glibc-debuginfo-2.12-1.149.el6_6.12")) flag++;
  if (rpm_check(release:"RHEL6", sp:"4", cpu:"x86_64", reference:"glibc-debuginfo-2.12-1.107.el6_4.10")) flag++;
  if (rpm_check(release:"RHEL6", sp:"2", cpu:"x86_64", reference:"glibc-debuginfo-2.12-1.47.el6_2.18")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"x86_64", reference:"glibc-debuginfo-2.12-1.132.el6_5.9")) flag++;
  if (rpm_check(release:"RHEL6", sp:"7", reference:"glibc-debuginfo-common-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"6", cpu:"i686", reference:"glibc-debuginfo-common-2.12-1.149.el6_6.12")) flag++;
  if (rpm_check(release:"RHEL6", sp:"4", cpu:"i686", reference:"glibc-debuginfo-common-2.12-1.107.el6_4.10")) flag++;
  if (rpm_check(release:"RHEL6", sp:"2", cpu:"i686", reference:"glibc-debuginfo-common-2.12-1.47.el6_2.18")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"i686", reference:"glibc-debuginfo-common-2.12-1.132.el6_5.9")) flag++;
  if (rpm_check(release:"RHEL6", sp:"6", cpu:"x86_64", reference:"glibc-debuginfo-common-2.12-1.149.el6_6.12")) flag++;
  if (rpm_check(release:"RHEL6", sp:"4", cpu:"x86_64", reference:"glibc-debuginfo-common-2.12-1.107.el6_4.10")) flag++;
  if (rpm_check(release:"RHEL6", sp:"2", cpu:"x86_64", reference:"glibc-debuginfo-common-2.12-1.47.el6_2.18")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"x86_64", reference:"glibc-debuginfo-common-2.12-1.132.el6_5.9")) flag++;
  if (rpm_check(release:"RHEL6", sp:"7", reference:"glibc-devel-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"6", cpu:"i686", reference:"glibc-devel-2.12-1.149.el6_6.12")) flag++;
  if (rpm_check(release:"RHEL6", sp:"4", cpu:"i686", reference:"glibc-devel-2.12-1.107.el6_4.10")) flag++;
  if (rpm_check(release:"RHEL6", sp:"2", cpu:"i686", reference:"glibc-devel-2.12-1.47.el6_2.18")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"i686", reference:"glibc-devel-2.12-1.132.el6_5.9")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"s390", reference:"glibc-devel-2.5-123.el5_11.4")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"s390x", reference:"glibc-devel-2.5-123.el5_11.4")) flag++;
  if (rpm_check(release:"RHEL6", sp:"6", cpu:"x86_64", reference:"glibc-devel-2.12-1.149.el6_6.12")) flag++;
  if (rpm_check(release:"RHEL6", sp:"4", cpu:"x86_64", reference:"glibc-devel-2.12-1.107.el6_4.10")) flag++;
  if (rpm_check(release:"RHEL6", sp:"2", cpu:"x86_64", reference:"glibc-devel-2.12-1.47.el6_2.18")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"x86_64", reference:"glibc-devel-2.12-1.132.el6_5.9")) flag++;
  if (rpm_check(release:"RHEL6", sp:"7", cpu:"i686", reference:"glibc-headers-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"7", cpu:"s390x", reference:"glibc-headers-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"s390x", reference:"glibc-headers-2.5-123.el5_11.4")) flag++;
  if (rpm_check(release:"RHEL6", sp:"6", cpu:"x86_64", reference:"glibc-headers-2.12-1.149.el6_6.12")) flag++;
  if (rpm_check(release:"RHEL6", sp:"4", cpu:"x86_64", reference:"glibc-headers-2.12-1.107.el6_4.10")) flag++;
  if (rpm_check(release:"RHEL6", sp:"7", cpu:"x86_64", reference:"glibc-headers-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"2", cpu:"x86_64", reference:"glibc-headers-2.12-1.47.el6_2.18")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"x86_64", reference:"glibc-headers-2.12-1.132.el6_5.9")) flag++;
  if (rpm_check(release:"RHEL6", sp:"7", reference:"glibc-static-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"6", cpu:"i686", reference:"glibc-static-2.12-1.149.el6_6.12")) flag++;
  if (rpm_check(release:"RHEL6", sp:"4", cpu:"i686", reference:"glibc-static-2.12-1.107.el6_4.10")) flag++;
  if (rpm_check(release:"RHEL6", sp:"2", cpu:"i686", reference:"glibc-static-2.12-1.47.el6_2.18")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"i686", reference:"glibc-static-2.12-1.132.el6_5.9")) flag++;
  if (rpm_check(release:"RHEL6", sp:"6", cpu:"x86_64", reference:"glibc-static-2.12-1.149.el6_6.12")) flag++;
  if (rpm_check(release:"RHEL6", sp:"4", cpu:"x86_64", reference:"glibc-static-2.12-1.107.el6_4.10")) flag++;
  if (rpm_check(release:"RHEL6", sp:"2", cpu:"x86_64", reference:"glibc-static-2.12-1.47.el6_2.18")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"x86_64", reference:"glibc-static-2.12-1.132.el6_5.9")) flag++;
  if (rpm_check(release:"RHEL6", sp:"7", cpu:"i686", reference:"glibc-utils-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"7", cpu:"s390x", reference:"glibc-utils-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"s390x", reference:"glibc-utils-2.5-123.el5_11.4")) flag++;
  if (rpm_check(release:"RHEL6", sp:"6", cpu:"x86_64", reference:"glibc-utils-2.12-1.149.el6_6.12")) flag++;
  if (rpm_check(release:"RHEL6", sp:"4", cpu:"x86_64", reference:"glibc-utils-2.12-1.107.el6_4.10")) flag++;
  if (rpm_check(release:"RHEL6", sp:"7", cpu:"x86_64", reference:"glibc-utils-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"2", cpu:"x86_64", reference:"glibc-utils-2.12-1.47.el6_2.18")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"x86_64", reference:"glibc-utils-2.12-1.132.el6_5.9")) flag++;
  if (rpm_check(release:"RHEL6", sp:"7", cpu:"i686", reference:"nscd-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"7", cpu:"s390x", reference:"nscd-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"s390x", reference:"nscd-2.5-123.el5_11.4")) flag++;
  if (rpm_check(release:"RHEL6", sp:"6", cpu:"x86_64", reference:"nscd-2.12-1.149.el6_6.12")) flag++;
  if (rpm_check(release:"RHEL6", sp:"4", cpu:"x86_64", reference:"nscd-2.12-1.107.el6_4.10")) flag++;
  if (rpm_check(release:"RHEL6", sp:"7", cpu:"x86_64", reference:"nscd-2.12-1.166.el6_7.8")) flag++;
  if (rpm_check(release:"RHEL6", sp:"2", cpu:"x86_64", reference:"nscd-2.12-1.47.el6_2.18")) flag++;
  if (rpm_check(release:"RHEL6", sp:"5", cpu:"x86_64", reference:"nscd-2.12-1.132.el6_5.9")) flag++;

  if (rpm_check(release:"RHEL7", sp:"2", reference:"glibc-2.17-106.el7_2.9")) flag++;
  if (rpm_check(release:"RHEL7", sp:"2", cpu:"s390x", reference:"glibc-common-2.17-106.el7_2.9")) flag++;
  if (rpm_check(release:"RHEL7", sp:"2", cpu:"x86_64", reference:"glibc-common-2.17-106.el7_2.9")) flag++;
  if (rpm_check(release:"RHEL7", sp:"2", reference:"glibc-debuginfo-2.17-106.el7_2.9")) flag++;
  if (rpm_check(release:"RHEL7", sp:"2", reference:"glibc-debuginfo-common-2.17-106.el7_2.9")) flag++;
  if (rpm_check(release:"RHEL7", sp:"2", reference:"glibc-devel-2.17-106.el7_2.9")) flag++;
  if (rpm_check(release:"RHEL7", sp:"2", cpu:"s390x", reference:"glibc-headers-2.17-106.el7_2.9")) flag++;
  if (rpm_check(release:"RHEL7", sp:"2", cpu:"x86_64", reference:"glibc-headers-2.17-106.el7_2.9")) flag++;
  if (rpm_check(release:"RHEL7", sp:"2", reference:"glibc-static-2.17-106.el7_2.9")) flag++;
  if (rpm_check(release:"RHEL7", sp:"2", cpu:"s390x", reference:"glibc-utils-2.17-106.el7_2.9")) flag++;
  if (rpm_check(release:"RHEL7", sp:"2", cpu:"x86_64", reference:"glibc-utils-2.17-106.el7_2.9")) flag++;
  if (rpm_check(release:"RHEL7", sp:"2", cpu:"s390x", reference:"nscd-2.17-106.el7_2.9")) flag++;
  if (rpm_check(release:"RHEL7", sp:"2", cpu:"x86_64", reference:"nscd-2.17-106.el7_2.9")) flag++;

  if (flag)
  {
    security_report_v4(
      port       : 0,
      severity   : SECURITY_HOLE,
      extra      : rpm_report_get() + redhat_report_package_caveat()
    );
    exit(0);
  }
  else
  {
    tested = pkg_tests_get();
    if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
    else audit(AUDIT_PACKAGE_NOT_INSTALLED, "glibc / glibc-common / glibc-debuginfo / glibc-debuginfo-common / etc");
  }
}
VendorProductVersionCPE
redhatenterprise_linux5cpe:/o:redhat:enterprise_linux:5
redhatenterprise_linux5.9cpe:/o:redhat:enterprise_linux:5.9
redhatenterprise_linux6.2cpe:/o:redhat:enterprise_linux:6.2
redhatenterprise_linux6.4cpe:/o:redhat:enterprise_linux:6.4
redhatenterprise_linux6.5cpe:/o:redhat:enterprise_linux:6.5
redhatenterprise_linux6.6cpe:/o:redhat:enterprise_linux:6.6
redhatenterprise_linux6.7cpe:/o:redhat:enterprise_linux:6.7
redhatenterprise_linux7.2cpe:/o:redhat:enterprise_linux:7.2
redhatenterprise_linuxglibcp-cpe:/a:redhat:enterprise_linux:glibc
redhatenterprise_linuxglibc-commonp-cpe:/a:redhat:enterprise_linux:glibc-common
Rows per page:
1-10 of 171