Fedora 27 : glibc (2018-c1ef35a4f9)

high Nessus Plugin ID 117375



The remote Fedora host is missing a security update.


This update removes a misleading comment from the documentation of the `abort` function (RHBZ#1615608). A minor security vulnerability, CVE-2018-11237, a buffer overflow in mempcpy for Xeon Phi (RHBZ#1581275) has been addressed.

The update also fixes the waiters-after-spinning case in the `pthread_cond_broadcast` function (RHBZ#1622669). Two bugs in the CPUID processing on x86 are also fixed (upstream bugs 23456 and 23459). The verification of vtables for stdio is improved (upstream bugs 23236 and 23313). A test case under a non-free license is removed (upstream bug 23363). The `if_nametoindex` now checks the length of interface names (upstream bug 22442). `getifaddrs` no longer returns interfaces with NULL names (upstream bug 23171). C++ compatibility of `iseqsig` has been improved (upstream bug 23171). A kernel header interaction issue related to `struct timespec` was addressed (upstream bug 23349).

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected glibc package.

See Also


Plugin Details

Severity: High

ID: 117375

File Name: fedora_2018-c1ef35a4f9.nasl

Version: 1.5

Type: local

Agent: unix

Published: 9/10/2018

Updated: 1/6/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P


Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:glibc, cpe:/o:fedoraproject:fedora:27

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/7/2018

Vulnerability Publication Date: 5/18/2018

Reference Information

CVE: CVE-2018-11237