lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200304102334.h3ANY0s32252@porkchop.devel.redhat.com>
Date: Thu, 10 Apr 2003 19:33 -0400
From: bugzilla@...hat.com
To: redhat-watch-list@...hat.com, redhat-announce-list@...hat.com
Cc: bugtraq@...urityfocus.com, full-disclosure@...ts.netsys.com
Subject: [RHSA-2003:089-00] Updated glibc packages fix vulnerabilities in RPC XDR decoder


---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated glibc packages fix vulnerabilities in RPC XDR decoder
Advisory ID:       RHSA-2003:089-00
Issue date:        2003-04-10
Updated on:        2003-04-10
Product:           Red Hat Linux
Keywords:          sun RPC XDR integer overflow
Cross references:  
Obsoletes:         RHSA-2002:166
CVE Names:         CAN-2003-0028
---------------------------------------------------------------------

1. Topic:

Updated glibc packages are available to fix an integer overflow in the XDR
decoder.

2. Relevant releases/architectures:

Red Hat Linux 6.2 - i386
Red Hat Linux 7.0 - i386, i686
Red Hat Linux 7.1 - i386, i686
Red Hat Linux 7.2 - i386, i686, ia64
Red Hat Linux 7.3 - i386, i686
Red Hat Linux 8.0 - i386, i686

3. Problem description:

The glibc package contains standard libraries that are used by
multiple programs on the system.  Sun RPC is a remote procedure call
framework that allows clients to invoke procedures in a server process
over a network.  XDR is a mechanism for encoding data structures for use
with RPC.  Glibc contains an XDR encoder/decoder derived from Sun's RPC
implementation, which was demonstrated to be vulnerable to an integer
overflow.

An integer overflow is present in the xdrmem_getbytes() function of glibc
2.3.1 and earlier.  Depending upon the application, this vulnerability
could cause buffer overflows and may be exploitable leading to arbitrary
code execution.

All users should upgrade to these errata packages which contain patches to
the glibc libraries and therefore are not vulnerable to these issues.

Red Hat would like to thank eEye Digital Security for alerting us to this
issue.

The Red Hat Linux 8.0 errata packages also contain a number of bug fixes
that are not security related. For details, see the list of bugzilla bugs
fixed by this errata or the ChangeLog.

[Updated 9 April 2003]
Some bugs newly introduced by the Red Hat Linux 8.0 errata packages
has been discovered, such as wine problems or problems with debugging
threaded applications.

Once the glibc upgrade has been completed, you must either reboot the
system or restart all programs on the system (for example, by using telinit
1 and switching back to the old runlevel). Rebooting the system or
restarting the system programs is necessary to avoid vulnerable glibc
copies in memory and because changes in NSS internal interfaces which mean
that one cannot mix old NSS modules or libresolv in an application with
upgraded NSS modules or libresolv in one running application.

If sshd is running so that the other services can be restarted remotely or
for a remote reboot during an unattended glibc upgrade, glibc will also
restart sshd.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

76531 - /etc/group breaks when lines longer than 671 characters
77467 - upgrade to RH 8.0 glibc breaks mysql remote connections
81901 - character limit on any line in /etc/group - not to exceed 860
82565 - Commands that access group names fails when NIS group is large
82619 - maximum number of users in group
82645 - SEGV in __res_nquery (/lib/libresolv.so.2)
82662 - regex library handle initialized values and crashes
88052 - register_printf_function() forgets to clear table
88056 - double free() from iofclose() on libio/tst-fopenloc
88093 - setcontext() is not signal safe
88099 - buffer underrun in read_input_file/gencat.c
88101 - using uninitialized local variable in math/test-tgmath
88104 - uinitialized variable used for __ieee754_gammal_r(NaN,)
87656 - LTC2324-Thread improperly loses lock on mutex when thread is cancelled.
86359 - /lib/i686 no longer used?
86339 - Update to glibc-2.3.2-4.80 breaks SSH
86465 - Undefined __ctype_b using glibc with ncurses
86468 - crossover 1.2 does not work since export LD_ASSUME_KERNEL=2.2.5 workaround in glibc is missing. update 8.0 glibc
86534 - RedHat's glibc-2.3.2 and Samba -> assert_uid() failures?

6. RPMs required:

Red Hat Linux 6.2:

SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/glibc-2.1.3-29.src.rpm

i386:
ftp://updates.redhat.com/6.2/en/os/i386/glibc-2.1.3-29.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/glibc-devel-2.1.3-29.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/glibc-profile-2.1.3-29.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/nscd-2.1.3-29.i386.rpm

Red Hat Linux 7.0:

SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/glibc-2.2.4-18.7.0.9.src.rpm

i386:
ftp://updates.redhat.com/7.0/en/os/i386/glibc-2.2.4-18.7.0.9.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/glibc-common-2.2.4-18.7.0.9.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/glibc-devel-2.2.4-18.7.0.9.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/glibc-profile-2.2.4-18.7.0.9.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/nscd-2.2.4-18.7.0.9.i386.rpm

i686:
ftp://updates.redhat.com/7.0/en/os/i686/glibc-2.2.4-18.7.0.9.i686.rpm

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/glibc-2.2.4-32.src.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/glibc-2.2.4-32.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/glibc-common-2.2.4-32.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/glibc-devel-2.2.4-32.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/glibc-profile-2.2.4-32.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/nscd-2.2.4-32.i386.rpm

i686:
ftp://updates.redhat.com/7.1/en/os/i686/glibc-2.2.4-32.i686.rpm

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/glibc-2.2.4-32.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/glibc-2.2.4-32.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/glibc-common-2.2.4-32.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/glibc-devel-2.2.4-32.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/glibc-profile-2.2.4-32.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/nscd-2.2.4-32.i386.rpm

i686:
ftp://updates.redhat.com/7.2/en/os/i686/glibc-2.2.4-32.i686.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/glibc-2.2.4-32.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/glibc-common-2.2.4-32.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/glibc-devel-2.2.4-32.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/glibc-profile-2.2.4-32.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/nscd-2.2.4-32.ia64.rpm

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/glibc-2.2.5-43.src.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/glibc-2.2.5-43.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-common-2.2.5-43.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-debug-2.2.5-43.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-debug-static-2.2.5-43.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-devel-2.2.5-43.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-profile-2.2.5-43.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-utils-2.2.5-43.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/nscd-2.2.5-43.i386.rpm

i686:
ftp://updates.redhat.com/7.3/en/os/i686/glibc-2.2.5-43.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/glibc-debug-2.2.5-43.i686.rpm

Red Hat Linux 8.0:

SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/glibc-2.3.2-4.80.6.src.rpm

i386:
ftp://updates.redhat.com/8.0/en/os/i386/glibc-2.3.2-4.80.6.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/glibc-common-2.3.2-4.80.6.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/glibc-devel-2.3.2-4.80.6.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/glibc-debug-2.3.2-4.80.6.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/glibc-profile-2.3.2-4.80.6.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/glibc-debug-static-2.3.2-4.80.6.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/nscd-2.3.2-4.80.6.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/glibc-utils-2.3.2-4.80.6.i386.rpm

i686:
ftp://updates.redhat.com/8.0/en/os/i686/glibc-2.3.2-4.80.6.i686.rpm
ftp://updates.redhat.com/8.0/en/os/i686/glibc-debug-2.3.2-4.80.6.i686.rpm



7. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
62e0ab4e2bdad458361ec80d8245d258 6.2/en/os/SRPMS/glibc-2.1.3-29.src.rpm
a348d457ad41811c1a3eac0df0a87fc7 6.2/en/os/i386/glibc-2.1.3-29.i386.rpm
a27dc4287275e31d1d880e97363a968d 6.2/en/os/i386/glibc-devel-2.1.3-29.i386.rpm
c552a2a1ea608b8a84ed1b566522d254 6.2/en/os/i386/glibc-profile-2.1.3-29.i386.rpm
8aecbace9b0d4ff6a967622e11bc496f 6.2/en/os/i386/nscd-2.1.3-29.i386.rpm
9d85a9a6151dce2d1dbe0e927f04245f 7.0/en/os/SRPMS/glibc-2.2.4-18.7.0.9.src.rpm
c42fac72eaf7701ca065a4ccb6f0153a 7.0/en/os/i386/glibc-2.2.4-18.7.0.9.i386.rpm
26e54d659fb58b28738b9405035d568f 7.0/en/os/i386/glibc-common-2.2.4-18.7.0.9.i386.rpm
3b4b852082782a52ffdee7f429015bf5 7.0/en/os/i386/glibc-devel-2.2.4-18.7.0.9.i386.rpm
131c0cdf232d5c1813c8a148e9560be0 7.0/en/os/i386/glibc-profile-2.2.4-18.7.0.9.i386.rpm
f6ae3bd79665488945f50d0edcf65177 7.0/en/os/i386/nscd-2.2.4-18.7.0.9.i386.rpm
580ac0d305eb59884725d030d97cccc2 7.0/en/os/i686/glibc-2.2.4-18.7.0.9.i686.rpm
ecdba77a6d14da22cb177e0abf414a63 7.1/en/os/SRPMS/glibc-2.2.4-32.src.rpm
8acd0559a855451e799844642aba68a1 7.1/en/os/i386/glibc-2.2.4-32.i386.rpm
5f8e424f8f8bea96b8148569fe76f676 7.1/en/os/i386/glibc-common-2.2.4-32.i386.rpm
69adfa611538eccb1f9af0060ebc1005 7.1/en/os/i386/glibc-devel-2.2.4-32.i386.rpm
8979153117cbbe8e9dc339832d90371b 7.1/en/os/i386/glibc-profile-2.2.4-32.i386.rpm
8f47e69a49d039028e5e5871a61404d5 7.1/en/os/i386/nscd-2.2.4-32.i386.rpm
f95a9614f0903e665d4868db72343672 7.1/en/os/i686/glibc-2.2.4-32.i686.rpm
ecdba77a6d14da22cb177e0abf414a63 7.2/en/os/SRPMS/glibc-2.2.4-32.src.rpm
8acd0559a855451e799844642aba68a1 7.2/en/os/i386/glibc-2.2.4-32.i386.rpm
5f8e424f8f8bea96b8148569fe76f676 7.2/en/os/i386/glibc-common-2.2.4-32.i386.rpm
69adfa611538eccb1f9af0060ebc1005 7.2/en/os/i386/glibc-devel-2.2.4-32.i386.rpm
8979153117cbbe8e9dc339832d90371b 7.2/en/os/i386/glibc-profile-2.2.4-32.i386.rpm
8f47e69a49d039028e5e5871a61404d5 7.2/en/os/i386/nscd-2.2.4-32.i386.rpm
f95a9614f0903e665d4868db72343672 7.2/en/os/i686/glibc-2.2.4-32.i686.rpm
007dc5f3cb374d14336f3f266d3bea2b 7.2/en/os/ia64/glibc-2.2.4-32.ia64.rpm
15d563b7bd87efed597e6743f90ce9b8 7.2/en/os/ia64/glibc-common-2.2.4-32.ia64.rpm
f3d7ece002e59df71d66e2466253841b 7.2/en/os/ia64/glibc-devel-2.2.4-32.ia64.rpm
979b15fd0df46f1466d18531da482ae9 7.2/en/os/ia64/glibc-profile-2.2.4-32.ia64.rpm
3cf31f2cbfdeda6a9b3798b06b53ca77 7.2/en/os/ia64/nscd-2.2.4-32.ia64.rpm
f42271d9ace5d8251c6ff7cce6731c0b 7.3/en/os/SRPMS/glibc-2.2.5-43.src.rpm
97277f54447fae6c37d8bb1e49f99481 7.3/en/os/i386/glibc-2.2.5-43.i386.rpm
e2e952edc1bf2807d0f158d4983d73dc 7.3/en/os/i386/glibc-common-2.2.5-43.i386.rpm
f907c32e672a1408aa6cc89ae16e0f2f 7.3/en/os/i386/glibc-debug-2.2.5-43.i386.rpm
806d2c9e33a65e05df0719b67c1c061f 7.3/en/os/i386/glibc-debug-static-2.2.5-43.i386.rpm
0400f0b2775a7c964ef29f226cfe438b 7.3/en/os/i386/glibc-devel-2.2.5-43.i386.rpm
746b89ddddd31a998257b0daf24960f0 7.3/en/os/i386/glibc-profile-2.2.5-43.i386.rpm
5f7f2463520d9437c6288a9003198683 7.3/en/os/i386/glibc-utils-2.2.5-43.i386.rpm
5aa6664f6fb5af7d4bdb93570ff57eff 7.3/en/os/i386/nscd-2.2.5-43.i386.rpm
d42a1e3194a7e1e81fb25224c2a90c26 7.3/en/os/i686/glibc-2.2.5-43.i686.rpm
a16799782d9d5c482813af751d3060d8 7.3/en/os/i686/glibc-debug-2.2.5-43.i686.rpm
231a9874b0597979d4adcb755f3a7b54 8.0/en/os/SRPMS/glibc-2.3.2-4.80.6.src.rpm
57aeffb616ba40a37e97c83a61f2580b 8.0/en/os/i386/glibc-2.3.2-4.80.6.i386.rpm
376eb93ae98d0549341a72cc30d136f1 8.0/en/os/i386/glibc-common-2.3.2-4.80.6.i386.rpm
33df668ac9b7354ff18aaa21e621badc 8.0/en/os/i386/glibc-debug-2.3.2-4.80.6.i386.rpm
3808e39a63387091f5c79fda2bce7996 8.0/en/os/i386/glibc-debug-static-2.3.2-4.80.6.i386.rpm
be6414a0ae8aaff813fc380d90fe849c 8.0/en/os/i386/glibc-devel-2.3.2-4.80.6.i386.rpm
5660879916039d575942d0c3b379c8a0 8.0/en/os/i386/glibc-profile-2.3.2-4.80.6.i386.rpm
1a378845493dee06a8b1b255c8c3102a 8.0/en/os/i386/glibc-utils-2.3.2-4.80.6.i386.rpm
9bfbf1badc79b5606744555fb10b1d73 8.0/en/os/i386/nscd-2.3.2-4.80.6.i386.rpm
b6a569706c8a89e1269ceb5fb453014b 8.0/en/os/i686/glibc-2.3.2-4.80.6.i686.rpm
a4f4d2d936b8a9ba2bd0a055319e1b63 8.0/en/os/i686/glibc-debug-2.3.2-4.80.6.i686.rpm


These packages are GPG signed by Red Hat for security.  Our key is
available at http://www.redhat.com/solutions/security/news/publickey/

You can verify each package with the following command:
    
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum <filename>


8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0028

9. Contact:

The Red Hat security contact is <security@...hat.com>.  More contact
details at http://www.redhat.com/solutions/security/news/contact/

Copyright 2003 Red Hat, Inc.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ