First published: Fri May 18 2018(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/glibc | <2.28 | 2.28 |
GNU glibc | <=2.27 | |
Redhat Virtualization Host | =4.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Oracle Communications Session Border Controller | =8.0.0 | |
Oracle Communications Session Border Controller | =8.1.0 | |
Oracle Communications Session Border Controller | =8.2.0 | |
Oracle Enterprise Communications Broker | =3.0.0 | |
Oracle Enterprise Communications Broker | =3.1.0 | |
Netapp Data Ontap Edge | ||
Netapp Element Software Management | ||
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u9 2.36-9+deb12u7 2.40-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11236 is a vulnerability in the GNU C Library (glibc) that could allow for arbitrary code execution.
CVE-2018-11236 has a severity rating of 9.8 (Critical).
The affected software versions include glibc 2.27 and earlier.
To fix CVE-2018-11236, update your glibc installation to version 2.28 or higher.
You can find more information about CVE-2018-11236 at the following references: [Link 1](https://sourceware.org/bugzilla/show_bug.cgi?id=22786), [Link 2](https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2), [Link 3](http://www.securityfocus.com/bid/104255)