Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.51067
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2004:586
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2004:586.

The GNU libc packages (known as glibc) contain the standard C libraries
used by applications.

This errata fixes several bugs in the GNU C Library.

Fixes include (in addition to enclosed Bugzilla entries):

- - fixed 32-bit atomic operations on 64-bit powerpc
- - fixed -m32 -I /usr/include/nptl compilation on AMD64
- - NPTL should now be usable in C++ code or -pedantic -std=c89 C
- - rwlocks are now available also in the _POSIX_C_SOURCE=200112L namespace
- - pthread_once is no longer throw(), as the callback routine might throw
- - pthread_create now correctly returns EAGAIN when thread couldn't be
created because of lack of memory
- - fixed NPTL stack freeing in case of pthread_create failure with detached
thread
- - fixed pthread_mutex_timedlock on i386 and AMD64
- - Itanium gp saving fix in linuxthreads
- - fixed s390/s390x unwinding tests done during cancellation if stack frames
are small
- - fixed fnmatch(3) backslash handling
- - fixed out of memory behaviour of syslog(3)
- - resolver ID randomization
- - fixed fim (NaN, NaN)
- - glob(3) fixes for dangling symlinks
- - catchsegv fixed to work with both 32-bit and 64-bit binaries on x86-64,
s390x and ppc
- - fixed reinitialization of _res when using NPTL stack cache
- - updated bug reporting instructions, removed glibcbug script
- - fixed infinite loop in iconv with some options
- - fixed inet_aton return value
- - CPU friendlier busy waiting in linuxthreads on EM64T and IA-64
- - avoid blocking/masking debug signal in linuxthreads
- - fixed locale program output when neither LC_ALL nor LANG is set
- - fixed using of unitialized memory in localedef
- - fixed mntent_r escape processing
- - optimized mtrace script
- - linuxthread_db fixes on ppc64
- - cfi instructions in x86-64 linuxthreads vfork
- - some _POSIX_C_SOURCE=200112L namespace fixes

All users of glibc should upgrade to these updated packages, which resolve
these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2004-586.html

Risk factor : Medium

CVSS Score:
2.1

Referencia Cruzada: BugTraq ID: 11286
Common Vulnerability Exposure (CVE) ID: CVE-2004-0968
http://www.securityfocus.com/bid/11286
Debian Security Information: DSA-636 (Google Search)
http://www.debian.org/security/2005/dsa-636
http://security.gentoo.org/glsa/glsa-200410-19.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9523
http://www.redhat.com/support/errata/RHSA-2004-586.html
http://www.redhat.com/support/errata/RHSA-2005-261.html
http://www.trustix.org/errata/2004/0050
https://www.ubuntu.com/usn/usn-4-1/
XForce ISS Database: script-temporary-file-overwrite(17583)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.