Skip to navigation

Security Advisory glibc security update

Advisory: RHSA-2004:383-05
Type: Security Advisory
Severity: Important
Issued on: 2004-08-04
Last updated on: 2004-08-04
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2002-0029

Details

Updated glibc packages that fix a security flaw in the resolver as well as
dlclose handling are now available.

The GNU libc packages (known as glibc) contain the standard C libraries
used by applications.

A security audit of the glibc packages in Red Hat Enterprise Linux 2.1
found a flaw in the resolver library which was originally reported as
affecting versions of ISC BIND 4.9. This flaw also applied to glibc
versions before 2.3.2. An attacker who is able to send DNS responses
(perhaps by creating a malicious DNS server) could remotely exploit this
vulnerability to execute arbitrary code or cause a denial of service. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2002-0029 to this issue.

These updated packages also fix a dlclose function bug on certain shared
libraries, which caused program crashes.

All users of glibc should upgrade to these updated packages, which
resolve these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
glibc-2.2.4-32.17.src.rpm
File outdated by:  RHEA-2006:0279
    MD5: b4d2a8e68ab0c47b20a3e8f28c388011
 
IA-32:
glibc-2.2.4-32.17.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 7089eff3f030f73c37b16691a34a2b97
glibc-2.2.4-32.17.i686.rpm
File outdated by:  RHEA-2006:0279
    MD5: 3759263848efde88bcecb0eb404772ab
glibc-common-2.2.4-32.17.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: fb411e71f3ba6fe81f46fa4acbde876f
glibc-devel-2.2.4-32.17.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 93003bc237e963643e84c6b7d63cc97f
glibc-profile-2.2.4-32.17.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: a3bd7862248bcd16dce99aee952bf68b
nscd-2.2.4-32.17.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: acd91794ce623d27a77522bd5c750d21
 
IA-64:
glibc-2.2.4-32.17.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: d08bed26e615ddf28be28dbda0ec9d39
glibc-common-2.2.4-32.17.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: db4c6bf46928d2df68a19ce16e4f2a46
glibc-devel-2.2.4-32.17.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: a86dc32711365bfbf1b46e7218b2a413
glibc-profile-2.2.4-32.17.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: 8ed7e292bf7d08d2c7a94e48ce6a3bec
nscd-2.2.4-32.17.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: 0f898c80d110feaebbf115bd3a73a546
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
glibc-2.2.4-32.17.src.rpm
File outdated by:  RHEA-2006:0279
    MD5: b4d2a8e68ab0c47b20a3e8f28c388011
 
IA-32:
glibc-2.2.4-32.17.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 7089eff3f030f73c37b16691a34a2b97
glibc-2.2.4-32.17.i686.rpm
File outdated by:  RHEA-2006:0279
    MD5: 3759263848efde88bcecb0eb404772ab
glibc-common-2.2.4-32.17.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: fb411e71f3ba6fe81f46fa4acbde876f
glibc-devel-2.2.4-32.17.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 93003bc237e963643e84c6b7d63cc97f
glibc-profile-2.2.4-32.17.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: a3bd7862248bcd16dce99aee952bf68b
nscd-2.2.4-32.17.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: acd91794ce623d27a77522bd5c750d21
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
glibc-2.2.4-32.17.src.rpm
File outdated by:  RHEA-2006:0279
    MD5: b4d2a8e68ab0c47b20a3e8f28c388011
 
IA-32:
glibc-2.2.4-32.17.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 7089eff3f030f73c37b16691a34a2b97
glibc-2.2.4-32.17.i686.rpm
File outdated by:  RHEA-2006:0279
    MD5: 3759263848efde88bcecb0eb404772ab
glibc-common-2.2.4-32.17.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: fb411e71f3ba6fe81f46fa4acbde876f
glibc-devel-2.2.4-32.17.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: 93003bc237e963643e84c6b7d63cc97f
glibc-profile-2.2.4-32.17.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: a3bd7862248bcd16dce99aee952bf68b
nscd-2.2.4-32.17.i386.rpm
File outdated by:  RHEA-2006:0279
    MD5: acd91794ce623d27a77522bd5c750d21
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
glibc-2.2.4-32.17.src.rpm
File outdated by:  RHEA-2006:0279
    MD5: b4d2a8e68ab0c47b20a3e8f28c388011
 
IA-64:
glibc-2.2.4-32.17.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: d08bed26e615ddf28be28dbda0ec9d39
glibc-common-2.2.4-32.17.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: db4c6bf46928d2df68a19ce16e4f2a46
glibc-devel-2.2.4-32.17.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: a86dc32711365bfbf1b46e7218b2a413
glibc-profile-2.2.4-32.17.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: 8ed7e292bf7d08d2c7a94e48ce6a3bec
nscd-2.2.4-32.17.ia64.rpm
File outdated by:  RHEA-2006:0279
    MD5: 0f898c80d110feaebbf115bd3a73a546
 

Bugs fixed (see bugzilla for more information)

120907 - umount passes randmon flags to sys_umount in kernel


References


Keywords

dlclose, glibc, ld.so, libdl, umount


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/