|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for glibc RHSA-2011:0413-01|
|Summary:||The remote host is missing an update for the 'glibc'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'glibc'
package(s) announced via the referenced advisory.
The glibc packages contain the standard C libraries used by multiple
programs on the system. These packages contain the standard C and the
standard math libraries. Without these two libraries, a Linux system cannot
The fix for CVE-2010-3847 introduced a regression in the way the dynamic
loader expanded the $ORIGIN dynamic string token specified in the RPATH and
RUNPATH entries in the ELF library header. A local attacker could use this
flaw to escalate their privileges via a setuid or setgid program using
such a library. (CVE-2011-0536)
It was discovered that the glibc fnmatch() function did not properly
restrict the use of alloca(). If the function was called on sufficiently
large inputs, it could cause an application using fnmatch() to crash or,
possibly, execute arbitrary code with the privileges of the application.
It was discovered that the locale command did not produce properly escaped
output as required by the POSIX specification. If an attacker were able to
set the locale environment variables in the environment of a script that
performed shell evaluation on the output of the locale command, and that
script were run with different privileges than the attacker's, it could
execute arbitrary code with the privileges of the script. (CVE-2011-1095)
All users should upgrade to these updated packages, which contain
backported patches to correct these issues.
glibc on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2011-0536|
Bugtraq: 20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (Google Search)
Debian Security Information: DSA-2122-2 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2011-1071
BugTraq ID: 46563
Common Vulnerability Exposure (CVE) ID: CVE-2011-1095
Common Vulnerability Exposure (CVE) ID: CVE-2010-3847
BugTraq ID: 44154
Bugtraq: 20110105 VMSA-2011-0001 VMware ESX third party updates for Service Console packages glibc, sudo, and openldap (Google Search)
CERT/CC vulnerability note: VU#537223
Debian Security Information: DSA-2122 (Google Search)
RedHat Security Advisories: RHSA-2010:0787
SuSE Security Announcement: SUSE-SA:2010:052 (Google Search)
|Copyright||Copyright (c) 2012 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.