First published: Fri May 18 2018(Updated: )
An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/glibc | <2.28 | 2.28 |
GNU glibc | <=2.27 | |
Redhat Virtualization Host | =4.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Oracle Communications Session Border Controller | =8.0.0 | |
Oracle Communications Session Border Controller | =8.1.0 | |
Oracle Communications Session Border Controller | =8.2.0 | |
Oracle Enterprise Communications Broker | =3.0.0 | |
Oracle Enterprise Communications Broker | =3.1.0 | |
Netapp Data Ontap Edge | ||
Netapp Element Software Management | ||
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u9 2.36-9+deb12u7 2.40-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11237 is a vulnerability in the GNU C Library (glibc) that allows for a buffer overflow, potentially leading to remote code execution.
CVE-2018-11237 has a severity score of 7.8, which is considered high.
The GNU C Library (glibc) versions 2.27 and earlier are affected by CVE-2018-11237.
To fix CVE-2018-11237, you should update glibc to version 2.28 or later.
You can find more information about CVE-2018-11237 on the official Red Hat Bugzilla page (https://sourceware.org/bugzilla/show_bug.cgi?id=23196) and the SecurityFocus page (http://www.securityfocus.com/bid/104256).