An updated rhel-guest-image package that includes glibc packages that arenot vulnerable to CVE-2015-7547,
The glibc packages provide the standard C libraries (libc), POSIX threadlibraries (libpthread), standard math libraries (libm), and the NameServer Caching Daemon (nscd) used by multiple programs on the system.Without these libraries, the Linux system cannot function correctly.A stack-based buffer overflow was found in the way the libresolv libraryperformed dual A/AAAA DNS queries.

A remote attacker could create aspecially crafted DNS response which could cause libresolv to crash or,potentially, execute code with the permissions of the user running thelibrary. Note: this issue is only exposed when libresolv is called from thenss_dns NSS service module. (CVE-2015-7547)This issue was discovered by the Google Security Team and Red Hat.Red Hat has released updated glibc packages to address the CVE-2015-7547).

Theseupdated packages are available for existing systems built with therhel-guest-image package via “yum update glibc”.In addition, to ensure minimized exposure to this vulnerability and toreduce the risk of deploying new systems with the vulnerable glibc packages,Red Hat is releasing this updated rhel-guest-image package, which includesglibc packages that are not vulnerable to the CVE-2015-7547.Users of rhel-guest-image are advised to upgrade to this updated package,which includes the updated glibc packages.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: