lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030327144552.A31499@bungee.trustix.com>
Date: Thu, 27 Mar 2003 14:45:52 +0100
From: Trustix Secure Linux Advisor <tsl@...stix.com>
To: bugtraq@...urityfocus.com
Subject: TSLSA-2003-0014 - glibc


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2003-0014

Package name:      glibc
Summary:           xdr / rpc
Date:              2003-03-26
Affected versions: TSL 1.1, 1.2, 1.5

- --------------------------------------------------------------------------
Package description:
  The glibc package contains standard libraries which are used by multiple
  programs on the system. In order to save disk space and memory, as well as to
  make upgrading easier, common system code is kept in one place and shared
  between programs. This particular package contains the most important sets of
  shared libraries: the standard C library and the standard math library.
  Without these two libraries, a Linux system will not function.  The glibc
  package also contains national language (locale) support and timezone
  databases.


Problem description:
   An integer overflow was discovered in the xdrmem_getbytes() function of
   glibc 2.3.1 and earlier.  This function is part of the XDR encoder/decoder
   derived from Sun's RPC implementation.  
   
   This vulnerability might cause buffer overflows and could possibly be
   exploited to execute arbitray code.



Action:
  We recommend that all systems with this package installed be upgraded.


Location:
  All TSL updates are available from
  <URI:http://www.trustix.net/pub/Trustix/updates/>
  <URI:ftp://ftp.trustix.net/pub/Trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.

  Get SWUP from:
  <URI:ftp://ftp.trustix.net/pub/Trustix/software/swup/>


Public testing:
  These packages have been available for public testing for some time.
  If you want to contribute by testing the various packages in the
  testing tree, please feel free to share your findings on the
  tsl-discuss mailinglist.
  The testing tree is located at
  <URI:http://www.trustix.net/pub/Trustix/testing/>
  <URI:ftp://ftp.trustix.net/pub/Trustix/testing/>
  

Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.net/support/>


Verification:
  This advisory along with all TSL packages are signed with the TSL sign key.
  This key is available from:
  <URI:http://www.trustix.net/TSL-GPG-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.net/errata/trustix-1.2/> and
  <URI:http://www.trustix.net/errata/trustix-1.5/>
  or directly at
  <URI:http://www.trustix.net/errata/misc/2003/TSL-2003-0014-glibc.asc.txt>


MD5sums of the packages:
- --------------------------------------------------------------------------
fe9c277153f6d22fdafd8a214401563f  ./1.5/SRPMS/glibc-2.1.3-22tr.src.rpm
a10d5a882dc223fbbac01f0693537da4  ./1.5/RPMS/nscd-2.1.3-22tr.i586.rpm
e5a446cd2fb6989d15614d71c7d0177c  ./1.5/RPMS/glibc-profile-2.1.3-22tr.i586.rpm
e40a865a6369976eb600853548c34527  ./1.5/RPMS/glibc-devel-2.1.3-22tr.i586.rpm
14dab8234b4c08ff4cbd31fde948d1f1  ./1.5/RPMS/glibc-2.1.3-22tr.i586.rpm
fe9c277153f6d22fdafd8a214401563f  ./1.2/SRPMS/glibc-2.1.3-22tr.src.rpm
4c4cab0eba6f73076e507efe1e2f06dc  ./1.2/RPMS/nscd-2.1.3-22tr.i586.rpm
3262c2d809b651441af57ec792dfed11  ./1.2/RPMS/glibc-profile-2.1.3-22tr.i586.rpm
6c48f30edec63f62a8cf1d763c734c1c  ./1.2/RPMS/glibc-devel-2.1.3-22tr.i586.rpm
97f7bd6d43c497b5978a8d86928027b3  ./1.2/RPMS/glibc-2.1.3-22tr.i586.rpm
fe9c277153f6d22fdafd8a214401563f  ./1.1/SRPMS/glibc-2.1.3-22tr.src.rpm
885a9828bf112e1b123bb24deda2191c  ./1.1/RPMS/nscd-2.1.3-22tr.i586.rpm
da31eac54e4c326df5e28035d754df23  ./1.1/RPMS/glibc-profile-2.1.3-22tr.i586.rpm
c177de4109b197c58021f8b32808f611  ./1.1/RPMS/glibc-devel-2.1.3-22tr.i586.rpm
155859e8c46919b1f9679a9746776b9a  ./1.1/RPMS/glibc-2.1.3-22tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE+gbm2wRTcg4BxxS0RArWpAJ9M+MprUO3XBQUZi86wuccmXlAHhwCdFB8k
wCChErohnZMFiLzXyII5nm8=
=O4dd
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ