Fedora 9 : glib2-2.16.4-1.fc9 (2008-6048)

This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.

Synopsis :

The remote Fedora host is missing a security update.

Description :

><i>From the release announcement: * Update to PCRE 7.7 - fix a
heap-based </I>buffer overflow in PCRE (CVE-2008-2371) * Bug fixes:
528752 Win32 build and SSL not working 539074 Cannot get exit status
with g_spawn_command_line_sync() 316221 G_LOCK warns about breaking
strict-aliasing rules 519137 g_slice_dup macro needs cast for 64-bit
platform 536158 also bump GHashTable version when a node is removed
via g_hash_table_iter_remove()/g_hash_table_iter_steal() 529321 make
check fails in glib/pcre 314453 Nautilus crashes in Solaris when
browsing the attached file 502511 g_assert_cmphex prints invalid
message 538119 glib's mainloop leaks a pipe to sub-processes 540459
there are no way of getting the real number of bytes written in
GMemoryOutputStream 540423 unrecoverable error after
g_seekable_truncate(seekable,0,...) 530196
_g_local_file_has_trash_dir() doesn't handle st_dev == 0 528600
g_dummy_file_get_parent('scheme://example.com/') 536641 Filesystem
querying in gio does not list AFS and autofs file systems 537392
Additional colon in xattr name 528433 gdesktopappinfo snafu ... 526320
should not list mounts that the user doesn't have permiss... 527132
nautilus crash when making ftp connection 532852
totem_pl_parser_parse_with_base: assertion `... 459905 Bug in wcwidth
data 534085 g_unichar_iswide_cjk() has a totally wrong table * Updated
translations: Bulgarian (bg) German (de)

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :


Solution :

Update the affected glib2 package.

Risk factor :

High / CVSS Base Score : 7.5

Family: Fedora Local Security Checks

Nessus Plugin ID: 33411 (fedora_2008-6048.nasl)

Bugtraq ID:

CVE ID: CVE-2008-2371

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now