[Full-Disclosure] [RHSA-2003:089-00] Updated glibc packages fix vulnerabilities in RPC XDR decoder

From: bugzillaat_private
Date: Wed Mar 19 2003 - 14:10:17 PST

  • Next message: Bodo Moeller: "[Full-Disclosure] [OpenSSL Advisory] Klima-Pokorny-Rosa attack on PKCS #1 v1.5 padding"

    ---------------------------------------------------------------------
                       Red Hat Security Advisory
    
    Synopsis:          Updated glibc packages fix vulnerabilities in RPC XDR decoder
    Advisory ID:       RHSA-2003:089-00
    Issue date:        2003-03-19
    Updated on:        2003-03-19
    Product:           Red Hat Linux
    Keywords:          sun RPC XDR integer overflow
    Cross references:  
    Obsoletes:         RHSA-2002:166
    CVE Names:         CAN-2003-0028
    ---------------------------------------------------------------------
    
    1. Topic:
    
    Updated glibc packages are available to fix an integer overflow in the XDR
    decoder.
    
    2. Relevant releases/architectures:
    
    Red Hat Linux 6.2 - i386
    Red Hat Linux 7.0 - i386, i686
    Red Hat Linux 7.1 - i386, i686
    Red Hat Linux 7.2 - i386, i686, ia64
    Red Hat Linux 7.3 - i386, i686
    Red Hat Linux 8.0 - i386, i686
    
    3. Problem description:
    
    The glibc package contains standard libraries that are used by
    multiple programs on the system.  Sun RPC is a remote procedure call
    framework that allows clients to invoke procedures in a server process
    over a network.  XDR is a mechanism for encoding data structures for use
    with RPC.  Glibc contains an XDR encoder/decoder derived from Sun's RPC
    implementation, which was demonstrated to be vulnerable to an integer
    overflow.
    
    An integer overflow is present in the xdrmem_getbytes() function of glibc
    2.3.1 and earlier.  Depending upon the application, this vulnerability
    could cause buffer overflows and may be exploitable leading to arbitrary
    code execution.
    
    All users should upgrade to these errata packages which contain patches to
    the glibc libraries and therefore are not vulnerable to these issues.
    
    Red Hat would like to thank eEye Digital Security for alerting us to this
    issue.
    
    The Red Hat Linux 8.0 errata packages also contain a number of bugfixes
    that are not security related. For details, see the list of bugzilla bugs
    fixed by this errata or the ChangeLog.
    
    4. Solution:
    
    Before applying this update, make sure all previously released errata
    relevant to your system have been applied.
    
    To update all RPMs for your particular architecture, run:
    
    rpm -Fvh [filenames]
    
    where [filenames] is a list of the RPMs you wish to upgrade.  Only those
    RPMs which are currently installed will be updated.  Those RPMs which are
    not installed but included in the list will not be updated.  Note that you
    can also use wildcards (*.rpm) if your current directory *only* contains the
    desired RPMs.
    
    Please note that this update is also available via Red Hat Network.  Many
    people find this an easier way to apply updates.  To use Red Hat Network,
    launch the Red Hat Update Agent with the following command:
    
    up2date
    
    This will start an interactive process that will result in the appropriate
    RPMs being upgraded on your system.
    
    5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
    
    76531 - /etc/group breaks when lines longer than 671 characters
    77467 - upgrade to RH 8.0 glibc breaks mysql remote connections
    81901 - character limit on any line in /etc/group - not to exceed 860
    82565 - Commands that access group names fails when NIS group is large
    82619 - maximum number of users in group
    82645 - SEGV in __res_nquery (/lib/libresolv.so.2)
    82662 - regex library handle initialized values and crashes
    
    6. RPMs required:
    
    Red Hat Linux 6.2:
    
    SRPMS:
    ftp://updates.redhat.com/6.2/en/os/SRPMS/glibc-2.1.3-29.src.rpm
    
    i386:
    ftp://updates.redhat.com/6.2/en/os/i386/glibc-2.1.3-29.i386.rpm
    ftp://updates.redhat.com/6.2/en/os/i386/glibc-devel-2.1.3-29.i386.rpm
    ftp://updates.redhat.com/6.2/en/os/i386/glibc-profile-2.1.3-29.i386.rpm
    ftp://updates.redhat.com/6.2/en/os/i386/nscd-2.1.3-29.i386.rpm
    
    Red Hat Linux 7.0:
    
    SRPMS:
    ftp://updates.redhat.com/7.0/en/os/SRPMS/glibc-2.2.4-18.7.0.9.src.rpm
    
    i386:
    ftp://updates.redhat.com/7.0/en/os/i386/glibc-2.2.4-18.7.0.9.i386.rpm
    ftp://updates.redhat.com/7.0/en/os/i386/glibc-common-2.2.4-18.7.0.9.i386.rpm
    ftp://updates.redhat.com/7.0/en/os/i386/glibc-devel-2.2.4-18.7.0.9.i386.rpm
    ftp://updates.redhat.com/7.0/en/os/i386/glibc-profile-2.2.4-18.7.0.9.i386.rpm
    ftp://updates.redhat.com/7.0/en/os/i386/nscd-2.2.4-18.7.0.9.i386.rpm
    
    i686:
    ftp://updates.redhat.com/7.0/en/os/i686/glibc-2.2.4-18.7.0.9.i686.rpm
    
    Red Hat Linux 7.1:
    
    SRPMS:
    ftp://updates.redhat.com/7.1/en/os/SRPMS/glibc-2.2.4-32.src.rpm
    
    i386:
    ftp://updates.redhat.com/7.1/en/os/i386/glibc-2.2.4-32.i386.rpm
    ftp://updates.redhat.com/7.1/en/os/i386/glibc-common-2.2.4-32.i386.rpm
    ftp://updates.redhat.com/7.1/en/os/i386/glibc-devel-2.2.4-32.i386.rpm
    ftp://updates.redhat.com/7.1/en/os/i386/glibc-profile-2.2.4-32.i386.rpm
    ftp://updates.redhat.com/7.1/en/os/i386/nscd-2.2.4-32.i386.rpm
    
    i686:
    ftp://updates.redhat.com/7.1/en/os/i686/glibc-2.2.4-32.i686.rpm
    
    Red Hat Linux 7.2:
    
    SRPMS:
    ftp://updates.redhat.com/7.2/en/os/SRPMS/glibc-2.2.4-32.src.rpm
    
    i386:
    ftp://updates.redhat.com/7.2/en/os/i386/glibc-2.2.4-32.i386.rpm
    ftp://updates.redhat.com/7.2/en/os/i386/glibc-common-2.2.4-32.i386.rpm
    ftp://updates.redhat.com/7.2/en/os/i386/glibc-devel-2.2.4-32.i386.rpm
    ftp://updates.redhat.com/7.2/en/os/i386/glibc-profile-2.2.4-32.i386.rpm
    ftp://updates.redhat.com/7.2/en/os/i386/nscd-2.2.4-32.i386.rpm
    
    i686:
    ftp://updates.redhat.com/7.2/en/os/i686/glibc-2.2.4-32.i686.rpm
    
    ia64:
    ftp://updates.redhat.com/7.2/en/os/ia64/glibc-2.2.4-32.ia64.rpm
    ftp://updates.redhat.com/7.2/en/os/ia64/glibc-common-2.2.4-32.ia64.rpm
    ftp://updates.redhat.com/7.2/en/os/ia64/glibc-devel-2.2.4-32.ia64.rpm
    ftp://updates.redhat.com/7.2/en/os/ia64/glibc-profile-2.2.4-32.ia64.rpm
    ftp://updates.redhat.com/7.2/en/os/ia64/nscd-2.2.4-32.ia64.rpm
    
    Red Hat Linux 7.3:
    
    SRPMS:
    ftp://updates.redhat.com/7.3/en/os/SRPMS/glibc-2.2.5-43.src.rpm
    
    i386:
    ftp://updates.redhat.com/7.3/en/os/i386/glibc-2.2.5-43.i386.rpm
    ftp://updates.redhat.com/7.3/en/os/i386/glibc-common-2.2.5-43.i386.rpm
    ftp://updates.redhat.com/7.3/en/os/i386/glibc-debug-2.2.5-43.i386.rpm
    ftp://updates.redhat.com/7.3/en/os/i386/glibc-debug-static-2.2.5-43.i386.rpm
    ftp://updates.redhat.com/7.3/en/os/i386/glibc-devel-2.2.5-43.i386.rpm
    ftp://updates.redhat.com/7.3/en/os/i386/glibc-profile-2.2.5-43.i386.rpm
    ftp://updates.redhat.com/7.3/en/os/i386/glibc-utils-2.2.5-43.i386.rpm
    ftp://updates.redhat.com/7.3/en/os/i386/nscd-2.2.5-43.i386.rpm
    
    i686:
    ftp://updates.redhat.com/7.3/en/os/i686/glibc-2.2.5-43.i686.rpm
    ftp://updates.redhat.com/7.3/en/os/i686/glibc-debug-2.2.5-43.i686.rpm
    
    Red Hat Linux 8.0:
    
    SRPMS:
    ftp://updates.redhat.com/8.0/en/os/SRPMS/glibc-2.3.2-4.80.src.rpm
    
    i386:
    ftp://updates.redhat.com/8.0/en/os/i386/glibc-2.3.2-4.80.i386.rpm
    ftp://updates.redhat.com/8.0/en/os/i386/glibc-common-2.3.2-4.80.i386.rpm
    ftp://updates.redhat.com/8.0/en/os/i386/glibc-devel-2.3.2-4.80.i386.rpm
    ftp://updates.redhat.com/8.0/en/os/i386/glibc-debug-2.3.2-4.80.i386.rpm
    ftp://updates.redhat.com/8.0/en/os/i386/glibc-profile-2.3.2-4.80.i386.rpm
    ftp://updates.redhat.com/8.0/en/os/i386/glibc-debug-static-2.3.2-4.80.i386.rpm
    ftp://updates.redhat.com/8.0/en/os/i386/nscd-2.3.2-4.80.i386.rpm
    ftp://updates.redhat.com/8.0/en/os/i386/glibc-utils-2.3.2-4.80.i386.rpm
    
    i686:
    ftp://updates.redhat.com/8.0/en/os/i686/glibc-2.3.2-4.80.i686.rpm
    ftp://updates.redhat.com/8.0/en/os/i686/glibc-debug-2.3.2-4.80.i686.rpm
    
    
    
    7. Verification:
    
    MD5 sum                          Package Name
    --------------------------------------------------------------------------
    62e0ab4e2bdad458361ec80d8245d258 6.2/en/os/SRPMS/glibc-2.1.3-29.src.rpm
    a348d457ad41811c1a3eac0df0a87fc7 6.2/en/os/i386/glibc-2.1.3-29.i386.rpm
    a27dc4287275e31d1d880e97363a968d 6.2/en/os/i386/glibc-devel-2.1.3-29.i386.rpm
    c552a2a1ea608b8a84ed1b566522d254 6.2/en/os/i386/glibc-profile-2.1.3-29.i386.rpm
    8aecbace9b0d4ff6a967622e11bc496f 6.2/en/os/i386/nscd-2.1.3-29.i386.rpm
    9d85a9a6151dce2d1dbe0e927f04245f 7.0/en/os/SRPMS/glibc-2.2.4-18.7.0.9.src.rpm
    c42fac72eaf7701ca065a4ccb6f0153a 7.0/en/os/i386/glibc-2.2.4-18.7.0.9.i386.rpm
    26e54d659fb58b28738b9405035d568f 7.0/en/os/i386/glibc-common-2.2.4-18.7.0.9.i386.rpm
    3b4b852082782a52ffdee7f429015bf5 7.0/en/os/i386/glibc-devel-2.2.4-18.7.0.9.i386.rpm
    131c0cdf232d5c1813c8a148e9560be0 7.0/en/os/i386/glibc-profile-2.2.4-18.7.0.9.i386.rpm
    f6ae3bd79665488945f50d0edcf65177 7.0/en/os/i386/nscd-2.2.4-18.7.0.9.i386.rpm
    580ac0d305eb59884725d030d97cccc2 7.0/en/os/i686/glibc-2.2.4-18.7.0.9.i686.rpm
    ecdba77a6d14da22cb177e0abf414a63 7.1/en/os/SRPMS/glibc-2.2.4-32.src.rpm
    8acd0559a855451e799844642aba68a1 7.1/en/os/i386/glibc-2.2.4-32.i386.rpm
    5f8e424f8f8bea96b8148569fe76f676 7.1/en/os/i386/glibc-common-2.2.4-32.i386.rpm
    69adfa611538eccb1f9af0060ebc1005 7.1/en/os/i386/glibc-devel-2.2.4-32.i386.rpm
    8979153117cbbe8e9dc339832d90371b 7.1/en/os/i386/glibc-profile-2.2.4-32.i386.rpm
    8f47e69a49d039028e5e5871a61404d5 7.1/en/os/i386/nscd-2.2.4-32.i386.rpm
    f95a9614f0903e665d4868db72343672 7.1/en/os/i686/glibc-2.2.4-32.i686.rpm
    ecdba77a6d14da22cb177e0abf414a63 7.2/en/os/SRPMS/glibc-2.2.4-32.src.rpm
    8acd0559a855451e799844642aba68a1 7.2/en/os/i386/glibc-2.2.4-32.i386.rpm
    5f8e424f8f8bea96b8148569fe76f676 7.2/en/os/i386/glibc-common-2.2.4-32.i386.rpm
    69adfa611538eccb1f9af0060ebc1005 7.2/en/os/i386/glibc-devel-2.2.4-32.i386.rpm
    8979153117cbbe8e9dc339832d90371b 7.2/en/os/i386/glibc-profile-2.2.4-32.i386.rpm
    8f47e69a49d039028e5e5871a61404d5 7.2/en/os/i386/nscd-2.2.4-32.i386.rpm
    f95a9614f0903e665d4868db72343672 7.2/en/os/i686/glibc-2.2.4-32.i686.rpm
    007dc5f3cb374d14336f3f266d3bea2b 7.2/en/os/ia64/glibc-2.2.4-32.ia64.rpm
    15d563b7bd87efed597e6743f90ce9b8 7.2/en/os/ia64/glibc-common-2.2.4-32.ia64.rpm
    f3d7ece002e59df71d66e2466253841b 7.2/en/os/ia64/glibc-devel-2.2.4-32.ia64.rpm
    979b15fd0df46f1466d18531da482ae9 7.2/en/os/ia64/glibc-profile-2.2.4-32.ia64.rpm
    3cf31f2cbfdeda6a9b3798b06b53ca77 7.2/en/os/ia64/nscd-2.2.4-32.ia64.rpm
    f42271d9ace5d8251c6ff7cce6731c0b 7.3/en/os/SRPMS/glibc-2.2.5-43.src.rpm
    97277f54447fae6c37d8bb1e49f99481 7.3/en/os/i386/glibc-2.2.5-43.i386.rpm
    e2e952edc1bf2807d0f158d4983d73dc 7.3/en/os/i386/glibc-common-2.2.5-43.i386.rpm
    f907c32e672a1408aa6cc89ae16e0f2f 7.3/en/os/i386/glibc-debug-2.2.5-43.i386.rpm
    806d2c9e33a65e05df0719b67c1c061f 7.3/en/os/i386/glibc-debug-static-2.2.5-43.i386.rpm
    0400f0b2775a7c964ef29f226cfe438b 7.3/en/os/i386/glibc-devel-2.2.5-43.i386.rpm
    746b89ddddd31a998257b0daf24960f0 7.3/en/os/i386/glibc-profile-2.2.5-43.i386.rpm
    5f7f2463520d9437c6288a9003198683 7.3/en/os/i386/glibc-utils-2.2.5-43.i386.rpm
    5aa6664f6fb5af7d4bdb93570ff57eff 7.3/en/os/i386/nscd-2.2.5-43.i386.rpm
    d42a1e3194a7e1e81fb25224c2a90c26 7.3/en/os/i686/glibc-2.2.5-43.i686.rpm
    a16799782d9d5c482813af751d3060d8 7.3/en/os/i686/glibc-debug-2.2.5-43.i686.rpm
    005f2233e8c3ec021aa213403aba0b33 8.0/en/os/SRPMS/glibc-2.3.2-4.80.src.rpm
    4ed3fad01d2ac1659dc4de82d3ca9edd 8.0/en/os/i386/glibc-2.3.2-4.80.i386.rpm
    94c9971ef7bf51245ca09e98219af92d 8.0/en/os/i386/glibc-common-2.3.2-4.80.i386.rpm
    7df5a7116dd106597c7ea7931b7a460a 8.0/en/os/i386/glibc-debug-2.3.2-4.80.i386.rpm
    7c8f863f43aa26a74e6a726f81f90711 8.0/en/os/i386/glibc-debug-static-2.3.2-4.80.i386.rpm
    e60bc3fdee3d4d475f04207ed27a8485 8.0/en/os/i386/glibc-devel-2.3.2-4.80.i386.rpm
    533ff8650b033979b853fae7e9ebc291 8.0/en/os/i386/glibc-profile-2.3.2-4.80.i386.rpm
    37c9041bb23e92247c2702d768b04fde 8.0/en/os/i386/glibc-utils-2.3.2-4.80.i386.rpm
    7a1afdd22dea604552aefc4b552ca721 8.0/en/os/i386/nscd-2.3.2-4.80.i386.rpm
    820e9b6185c1dae6d41ec417ab5889f0 8.0/en/os/i686/glibc-2.3.2-4.80.i686.rpm
    c74fdf5b7defb143e114813419d10db6 8.0/en/os/i686/glibc-debug-2.3.2-4.80.i686.rpm
    
    
    These packages are GPG signed by Red Hat, Inc. for security.  Our key
    is available at http://www.redhat.com/about/contact/pgpkey.html
    
    You can verify each package with the following command:
        
        rpm --checksig -v <filename>
    
    If you only wish to verify that each package has not been corrupted or
    tampered with, examine only the md5sum with the following command:
        
        md5sum <filename>
    
    
    8. References:
    
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0028
    
    9. Contact:
    
    The Red Hat security contact is <securityat_private>.  More contact
    details at http://www.redhat.com/solutions/security/news/contact.html
    
    Copyright 2003 Red Hat, Inc.
    
    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html
    



    This archive was generated by hypermail 2b30 : Wed Mar 19 2003 - 14:42:17 PST