Immunix OS 7.0 glibc update

From: Immunix Security Team (securityat_private)
Date: Wed Dec 19 2001 - 17:46:53 PST

  • Next message: Mandrake Linux Security Team: "MDKSA-2001:095 - glibc update"

    -----------------------------------------------------------------------
    	Immunix OS Security Advisory
    
    Packages updated:	glibc, nscd
    Affected products:	Immunix OS 7.0
    Bugs fixed:		immunix/1892, immunix/1893
    Date:			Wed Dec 19 2001
    Advisory ID:		IMNX-2001-70-037-01
    Author:			Seth Arnold <sarnoldat_private>
    -----------------------------------------------------------------------
    
    Description:
      This update to glibc (and the associated name service cache daemon,
      nscd) fixes two security problems. The first problem is a race
      condition in the fts(3) routines that traverse directory structures
      which allowed malicious users to cause other processes to 'break out
      of' the file heirarchy.  The second problem is in the glob(3) routine;
      it is a combination of a buffer overflow and an incorrectly free()d
      buffer.
    
      The fts(3) problem was discovered by Nick Cleaton. The glob(3) problem
      was discovered simultaneously by several people, including script0r,
      Flávio Veloso, and Jakub Jelinek. Tom Parker also discovered that the
      glob(3) problem is exploitable. Flávio Veloso and Jakub Jelinek helped
      fix the glob(3) problems, and it appears that Kris Kennaway, Todd
      Miller, and Ulrich Drepper are primarily responsible for the fts(3)
      fixes.
    
      We recommend all Immunix 7.0 users upgrade glibc and nscd with these
      packages.
    
      References:
      http://sources.redhat.com/ml/bug-glibc/2001-11/msg00109.html
      http://www.securityfocus.com/archive/1/245956
      http://lists.progeny.com/archive/progeny-security-announce/2001/msg00024.html
    
    Package names and locations:
      Precompiled binary packages for Immunix 7.0 are available at:
      http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/glibc-2.2-12_imnx_12.i386.rpm
      http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/glibc-common-2.2-12_imnx_12.i386.rpm
      http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/glibc-devel-2.2-12_imnx_12.i386.rpm
      http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/glibc-profile-2.2-12_imnx_12.i386.rpm
      http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/nscd-2.2-12_imnx_12.i386.rpm
    
      Source package for Immunix 7.0 is available at:
      http://download.immunix.org/ImmunixOS/7.0/updates/SRPMS/glibc-2.2-12_imnx_12.src.rpm
    
    Immunix OS 7.0 md5sums:
    2a05dcc3e3f58f426e628a5fed0fd2ac  RPMS/glibc-2.2-12_imnx_12.i386.rpm
    2d84dd833ceab77f00f452f7543a4b48  RPMS/glibc-common-2.2-12_imnx_12.i386.rpm
    43648b8c310bbb080745a6d8a1b35f7e  RPMS/glibc-devel-2.2-12_imnx_12.i386.rpm
    ee13dd6fc866d841bfa4d2755397e942  RPMS/glibc-profile-2.2-12_imnx_12.i386.rpm
    14822515526ef18387b3e3fdf4b2845a  RPMS/nscd-2.2-12_imnx_12.i386.rpm
    7e378043c28aeee30f8270663f5faf82  SRPMS/glibc-2.2-12_imnx_12.src.rpm
    
    
    GPG verification:                                                               
      Our public key is available at <http://wirex.com/security/GPG_KEY>.           
      *** NOTE *** This key is different from the one used in advisories            
      IMNX-2001-70-020-01 and earlier.
    
    Online version of all Immunix 6.2 updates and advisories:
      http://immunix.org/ImmunixOS/6.2/updates/
    
    Online version of all Immunix 7.0-beta updates and advisories:
      http://immunix.org/ImmunixOS/7.0-beta/updates/
    
    Online version of all Immunix 7.0 updates and advisories:
      http://immunix.org/ImmunixOS/7.0/updates/
    
    NOTE:
      Ibiblio is graciously mirroring our updates, so if the links above are
      slow, please try:
        ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
      or one of the many mirrors available at:
        http://www.ibiblio.org/pub/Linux/MIRRORS.html
    
      ImmunixOS 6.2 is no longer officially supported.
    
    Contact information:
      To report vulnerabilities, please contact securityat_private WireX 
      attempts to conform to the RFP vulnerability disclosure protocol
      <http://www.wiretrip.net/rfp/policy.html>.
    
    
    



    This archive was generated by hypermail 2b30 : Thu Dec 20 2001 - 18:04:25 PST