Executive Summary
Summary | |
---|---|
Title | glibc security, bug fix, and enhancement update |
Informations | |||
---|---|---|---|
Name | RHSA-2019:3513 | First vendor Publication | 2019-11-05 |
Vendor | RedHat | Last vendor Modification | 2019-11-05 |
Severity (Vendor) | N/A | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 4.6 | Attack Range | Local |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An update for glibc is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64 3. Description: The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: getaddrinfo should reject IP addresses with trailing characters (CVE-2016-10739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For the update to take effect, all services linked to the glibc library must be restarted, or the system rebooted. 5. Bugs fixed (https://bugzilla.redhat.com/): 1347549 - CVE-2016-10739 glibc: getaddrinfo should reject IP addresses with trailing characters 1623537 - glibc: Test suite failure: math/test-ildouble-fma, math/test-ldouble-fma on ppc64le 1659293 - glibc: Fix rwlock/rdlock hang. 1659512 - glibc: Test suite failure: posix/tst-spawn 1662843 - glibc: realloc ncopies integer overflow [rhel-8] 1663035 - glibc: Backport gettext asprintf error handling fix 1664408 - glibc: Only build libm with -fno-math-errno 1670043 - glibc: libresolv should use IP_RECVERR/IPV6_RECVERR to avoid long timeouts [rhel-8] 1672773 - glibc: Missing robust mutex compiler barriers in pthread_mutex_trylock.c 1691528 - glibc: Binary locale files vary within a mutilib set e.g. x86_64/i686 and should not. 1699194 - glibc: Address conflict between |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2019-3513.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Alert History
Date | Informations |
---|---|
2020-03-19 13:19:32 |
|