

Rewterz Threat Advisory – Red Hat update for libreoffice
November 5, 2018
Rewterz Threat Advisory – Intel CPUs hyper-threading PortSmash Vulnerability
November 5, 2018
Rewterz Threat Advisory – Red Hat update for libreoffice
November 5, 2018
Rewterz Threat Advisory – Intel CPUs hyper-threading PortSmash Vulnerability
November 5, 2018Red Hat has released updates for glibc multiple vulnerabilities that cause privilege escalation and unauthorized system access.
IMPACT: CRITICAL
PUBLISH DATE: 05-11-2018
OVERVIEW
Red Hat has issued an update for glibc for fixing multiple vulnerabilities. These can be exploited by malicious, local users to acquire privilege escalation and by malicious people to compromise a vulnerable system.
ANALYSIS
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. If the glibc packages are compromised, the Linux system cannot function correctly without the above-mentioned libraries.
The security updates include following fixes for the given vulnerabilities.
CVE-2017-16997
glibc: This CVE number is allotted to an incorrect handling of RPATH in elf/dl-load.c, which can be used to execute code, loaded from arbitrary libraries.
CVE-2018-6485
glibc: This vulnerability results from an Integer overflow in posix_memalign in memalign functions.
CVE-2018-11236
glibc: This issue is caused by an Integer overflow in stdlib/canonicalize.c on 32-bit architectures. It leads to stack-based buffer overflow.
CVE-2018-11237
glibc: This problem arises from a Buffer overflow in __mempcpy_avx512_no_vzeroupper.
AFFECTED PRODUCTS
Red Hat Virtualization 4.x Red Hat Enterprise Linux Desktop 7
Red Hat Enterprise Linux HPC Node 7
Red Hat Enterprise Linux Server 7
Red Hat Enterprise Linux Workstation 7
UPDATES
Red Hat Network provides the updated packages via the following links.
https://access.redhat.com/errata/RHSA-2018:3092
If you think you’re the victim of a cyber-attack, immediately send an email to soc@rewterz.com for a quick response.