Applies to: All versions of Centrify DirectControl and Centrify DirectAudit
The CVE-2015-7547 is considered to have critical impact as reported in https://packetstormsecurity.com/files/135793/Debian-Security-Advisory-3480-1.html and https://packetstormsecurity.com/files/135791/Red-Hat-Security-Advisory-2016-0225-01.html.
Is Centrify DirectContorl or Centrify DirectAudit affected?
Is there a patch can be applied to fix this bug?
To summarize, the issue is libc.so that is part of glibc package. Centrify DirectControl / DirectAUdit does not ship libc.so - but use the one on the OS, and ship libgcc.so which is NOT part of glibc.
In other words, this is the issue with OS base, NOT CDC / CDA. Once the OS is patched, the new libc.so on the OS will be used. (adclient,dad,curl,dzdo,etc).
It is advised to apply the patch from OS vendor as soon as possible to minimize the exposure.
Additionally since CDC / CDA does not support IPv6, and thus do not make query for AAAA records, but the CLI like curl does. As a result, it is also recommended to apply the glibc patch from OS vendor as soon as possible.