Skip to navigation

Security Advisory glibc security update

Advisory: RHSA-2003:090-09
Type: Security Advisory
Severity: Critical
Issued on: 2003-05-22
Last updated on: 2003-05-22
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2003-0028

Details

Updated glibc packages are available to fix an integer overflow in the XDR
decoder.

The glibc package contains standard libraries which are used by
multiple programs on the system. Sun RPC is a remote procedure call
framework which allows clients to invoke procedures in a server process
over a network. XDR is a mechanism for encoding data structures for use
with RPC. NFS, NIS, and many other network services are built upon Sun
RPC. The XDR encoder/decoder provided with glibc, derived from Sun's RPC
implementation, was demonstrated to be vulnerable to an integer overflow.

An integer overflow is present in the xdrmem_getbytes() function of glibc
2.3.1 and earlier. Depending upon the application, this vulnerability
could cause buffer overflows and may be exploitable, leading to arbitrary
code execution.

All users should upgrade to these errata packages which contain patches to
the glibc libraries and, therefore, are not vulnerable to these issues.

Red Hat would like to thank eEye Digital Security for alerting us to this
issue.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

Please note that this update is available via Red Hat Network. To use Red
Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
glibc-2.2.4-32.3.src.rpm
File outdated by:  RHEA-2006:0279
    MD5: 569fa933854e41fc96ad5dd163a8124d
 
IA-32:
glibc-2.2.4-32.3.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 19c5386501dd0d91990d5ceb1e6c0b5d
glibc-2.2.4-32.3.i686.rpm
File outdated by:  RHEA-2006:0279
    MD5: d705fbbc61924dbc39fc8ed1e1505e7d
glibc-common-2.2.4-32.3.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: d2d8a1d255ea5f43bf5e8588a68074a1
glibc-devel-2.2.4-32.3.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 68a05546180c24ea8709c026ca3e74ed
glibc-profile-2.2.4-32.3.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 6aafdff1e6933bb966d958b5697c409d
nscd-2.2.4-32.3.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 193454c714245c000cb5f5f2ef66ab95
 
IA-64:
glibc-2.2.4-32.3.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: d47428ebe3cef29e793f00e5139ba461
glibc-common-2.2.4-32.3.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: 83d9660c0b97e9fa45fa3b006ef479f5
glibc-devel-2.2.4-32.3.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: 7663750681ad296ce533a5762701943f
glibc-profile-2.2.4-32.3.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: 638c887b3e471c32dfaa7fe136e6640d
nscd-2.2.4-32.3.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: 704d01e713a942fbb5e023b98151518a
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
glibc-2.2.4-32.3.src.rpm
File outdated by:  RHEA-2006:0279
    MD5: 569fa933854e41fc96ad5dd163a8124d
 
IA-32:
glibc-2.2.4-32.3.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 19c5386501dd0d91990d5ceb1e6c0b5d
glibc-2.2.4-32.3.i686.rpm
File outdated by:  RHEA-2006:0279
    MD5: d705fbbc61924dbc39fc8ed1e1505e7d
glibc-common-2.2.4-32.3.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: d2d8a1d255ea5f43bf5e8588a68074a1
glibc-devel-2.2.4-32.3.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 68a05546180c24ea8709c026ca3e74ed
glibc-profile-2.2.4-32.3.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 6aafdff1e6933bb966d958b5697c409d
nscd-2.2.4-32.3.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 193454c714245c000cb5f5f2ef66ab95
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
glibc-2.2.4-32.3.src.rpm
File outdated by:  RHEA-2006:0279
    MD5: 569fa933854e41fc96ad5dd163a8124d
 
IA-32:
glibc-2.2.4-32.3.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 19c5386501dd0d91990d5ceb1e6c0b5d
glibc-2.2.4-32.3.i686.rpm
File outdated by:  RHEA-2006:0279
    MD5: d705fbbc61924dbc39fc8ed1e1505e7d
glibc-common-2.2.4-32.3.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: d2d8a1d255ea5f43bf5e8588a68074a1
glibc-devel-2.2.4-32.3.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 68a05546180c24ea8709c026ca3e74ed
glibc-profile-2.2.4-32.3.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 6aafdff1e6933bb966d958b5697c409d
nscd-2.2.4-32.3.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 193454c714245c000cb5f5f2ef66ab95
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
glibc-2.2.4-32.3.src.rpm
File outdated by:  RHEA-2006:0279
    MD5: 569fa933854e41fc96ad5dd163a8124d
 
IA-64:
glibc-2.2.4-32.3.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: d47428ebe3cef29e793f00e5139ba461
glibc-common-2.2.4-32.3.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: 83d9660c0b97e9fa45fa3b006ef479f5
glibc-devel-2.2.4-32.3.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: 7663750681ad296ce533a5762701943f
glibc-profile-2.2.4-32.3.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: 638c887b3e471c32dfaa7fe136e6640d
nscd-2.2.4-32.3.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: 704d01e713a942fbb5e023b98151518a
 

Bugs fixed (see bugzilla for more information)

82640 - Gdb unable to debug threaded apps
83227 - An issue in glibc-2.2.4-3: gethostbyname fails on a multihomed Tiger 4
86061 - CAN-2003-0028 XDR overflow in glibc
86439 - memccpy() can read past end of source string


References


Keywords

glibc, integer, overflow, RPC, sun, XDR


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/