Red Hat has released updates for glibc multiple vulnerabilities that cause privilege escalation and unauthorized system access.
PUBLISH DATE: 05-11-2018
Red Hat has issued an update for glibc for fixing multiple vulnerabilities. These can be exploited by malicious, local users to acquire privilege escalation and by malicious people to compromise a vulnerable system.
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. If the glibc packages are compromised, the Linux system cannot function correctly without the above-mentioned libraries.
The security updates include following fixes for the given vulnerabilities.
glibc: This CVE number is allotted to an incorrect handling of RPATH in elf/dl-load.c, which can be used to execute code, loaded from arbitrary libraries.
glibc: This vulnerability results from an Integer overflow in posix_memalign in memalign functions.
glibc: This issue is caused by an Integer overflow in stdlib/canonicalize.c on 32-bit architectures. It leads to stack-based buffer overflow.
glibc: This problem arises from a Buffer overflow in __mempcpy_avx512_no_vzeroupper.
Red Hat Virtualization 4.x Red Hat Enterprise Linux Desktop 7
Red Hat Enterprise Linux HPC Node 7
Red Hat Enterprise Linux Server 7
Red Hat Enterprise Linux Workstation 7
Red Hat Network provides the updated packages via the following links.
If you think you’re the victim of a cyber-attack, immediately send an email to firstname.lastname@example.org for a quick response.