Fedora 27 : glibc (2018-c1ef35a4f9)

Medium Nessus Plugin ID 117375

Synopsis

The remote Fedora host is missing a security update.

Description

This update removes a misleading comment from the documentation of the `abort` function (RHBZ#1615608). A minor security vulnerability, CVE-2018-11237, a buffer overflow in mempcpy for Xeon Phi (RHBZ#1581275) has been addressed.

The update also fixes the waiters-after-spinning case in the `pthread_cond_broadcast` function (RHBZ#1622669). Two bugs in the CPUID processing on x86 are also fixed (upstream bugs 23456 and 23459). The verification of vtables for stdio is improved (upstream bugs 23236 and 23313). A test case under a non-free license is removed (upstream bug 23363). The `if_nametoindex` now checks the length of interface names (upstream bug 22442). `getifaddrs` no longer returns interfaces with NULL names (upstream bug 23171). C++ compatibility of `iseqsig` has been improved (upstream bug 23171). A kernel header interaction issue related to `struct timespec` was addressed (upstream bug 23349).

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected glibc package.

See Also

https://bodhi.fedoraproject.org/updates/FEDORA-2018-c1ef35a4f9

Plugin Details

Severity: Medium

ID: 117375

File Name: fedora_2018-c1ef35a4f9.nasl

Version: 1.1

Type: local

Agent: unix

Published: 2018/09/10

Modified: 2018/09/10

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSSv3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:glibc, cpe:/o:fedoraproject:fedora:27

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2018/09/07

Reference Information

CVE: CVE-2018-11237