Red Hat has released updated glibc packages for Red Hat Enterprise Linux 2.1
----------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Updated glibc packages fix flaws
Advisory ID: RHSA-2004:383-01
Issue date: 2004-08-04
Updated on: 2004-08-04
Product: Red Hat Enterprise Linux
Keywords: glibc libdl ld.so dlclose umount
CVE Names: CAN-2002-0029
----------------------------------------------------------------------
1. Summary:
Updated glibc packages that fix a security flaw in the resolver as well as dlclose handling are now available.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, i686, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386, i686
Red Hat Enterprise Linux WS version 2.1 - i386, i686
3. Problem description:
The GNU libc packages (known as glibc) contain the standard C libraries used by applications.
A security audit of the glibc packages in Red Hat Enterprise Linux 2.1 found a flaw in the resolver library which was originally reported as affecting versions of ISC BIND 4.9. This flaw also applied to glibc versions before 2.3.2. An attacker who is able to send DNS responses (perhaps by creating a malicious DNS server) could remotely exploit this vulnerability to execute arbitrary code or cause a denial of service. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2002-0029 to this issue.
These updated packages also fix a dlclose function bug on certain shared libraries, which caused program crashes.
All users of glibc should upgrade to these updated packages, which resolve these issues.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):
120907 - umount passes randmon flags to sys_umount in kernel
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/glibc-2.2.4-32.17.src.rpm
b4d2a8e68ab0c47b20a3e8f28c388011 glibc-2.2.4-32.17.src.rpm
i386:
7089eff3f030f73c37b16691a34a2b97 glibc-2.2.4-32.17.i386.rpm
fb411e71f3ba6fe81f46fa4acbde876f glibc-common-2.2.4-32.17.i386.rpm
93003bc237e963643e84c6b7d63cc97f glibc-devel-2.2.4-32.17.i386.rpm
a3bd7862248bcd16dce99aee952bf68b glibc-profile-2.2.4-32.17.i386.rpm
acd91794ce623d27a77522bd5c750d21 nscd-2.2.4-32.17.i386.rpm
i686:
3759263848efde88bcecb0eb404772ab glibc-2.2.4-32.17.i686.rpm
ia64:
d08bed26e615ddf28be28dbda0ec9d39 glibc-2.2.4-32.17.ia64.rpm
db4c6bf46928d2df68a19ce16e4f2a46 glibc-common-2.2.4-32.17.ia64.rpm
a86dc32711365bfbf1b46e7218b2a413 glibc-devel-2.2.4-32.17.ia64.rpm
8ed7e292bf7d08d2c7a94e48ce6a3bec glibc-profile-2.2.4-32.17.ia64.rpm
0f898c80d110feaebbf115bd3a73a546 nscd-2.2.4-32.17.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/glibc-2.2.4-32.17.src.rpm
b4d2a8e68ab0c47b20a3e8f28c388011 glibc-2.2.4-32.17.src.rpm
ia64:
d08bed26e615ddf28be28dbda0ec9d39 glibc-2.2.4-32.17.ia64.rpm
db4c6bf46928d2df68a19ce16e4f2a46 glibc-common-2.2.4-32.17.ia64.rpm
a86dc32711365bfbf1b46e7218b2a413 glibc-devel-2.2.4-32.17.ia64.rpm
8ed7e292bf7d08d2c7a94e48ce6a3bec glibc-profile-2.2.4-32.17.ia64.rpm
0f898c80d110feaebbf115bd3a73a546 nscd-2.2.4-32.17.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/glibc-2.2.4-32.17.src.rpm
b4d2a8e68ab0c47b20a3e8f28c388011 glibc-2.2.4-32.17.src.rpm
i386:
7089eff3f030f73c37b16691a34a2b97 glibc-2.2.4-32.17.i386.rpm
fb411e71f3ba6fe81f46fa4acbde876f glibc-common-2.2.4-32.17.i386.rpm
93003bc237e963643e84c6b7d63cc97f glibc-devel-2.2.4-32.17.i386.rpm
a3bd7862248bcd16dce99aee952bf68b glibc-profile-2.2.4-32.17.i386.rpm
acd91794ce623d27a77522bd5c750d21 nscd-2.2.4-32.17.i386.rpm
i686:
3759263848efde88bcecb0eb404772ab glibc-2.2.4-32.17.i686.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/glibc-2.2.4-32.17.src.rpm
b4d2a8e68ab0c47b20a3e8f28c388011 glibc-2.2.4-32.17.src.rpm
i386:
7089eff3f030f73c37b16691a34a2b97 glibc-2.2.4-32.17.i386.rpm
fb411e71f3ba6fe81f46fa4acbde876f glibc-common-2.2.4-32.17.i386.rpm
93003bc237e963643e84c6b7d63cc97f glibc-devel-2.2.4-32.17.i386.rpm
a3bd7862248bcd16dce99aee952bf68b glibc-profile-2.2.4-32.17.i386.rpm
acd91794ce623d27a77522bd5c750d21 nscd-2.2.4-32.17.i386.rpm
i686:
3759263848efde88bcecb0eb404772ab glibc-2.2.4-32.17.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key.html#package
7. References:
http://www.kb.cert.org/vuls/id/844360
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0029
8. Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact.html
Copyright 2004 Red Hat, Inc.
----------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Updated glibc packages fix flaws
Advisory ID: RHSA-2004:383-01
Issue date: 2004-08-04
Updated on: 2004-08-04
Product: Red Hat Enterprise Linux
Keywords: glibc libdl ld.so dlclose umount
CVE Names: CAN-2002-0029
----------------------------------------------------------------------
1. Summary:
Updated glibc packages that fix a security flaw in the resolver as well as dlclose handling are now available.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, i686, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386, i686
Red Hat Enterprise Linux WS version 2.1 - i386, i686
3. Problem description:
The GNU libc packages (known as glibc) contain the standard C libraries used by applications.
A security audit of the glibc packages in Red Hat Enterprise Linux 2.1 found a flaw in the resolver library which was originally reported as affecting versions of ISC BIND 4.9. This flaw also applied to glibc versions before 2.3.2. An attacker who is able to send DNS responses (perhaps by creating a malicious DNS server) could remotely exploit this vulnerability to execute arbitrary code or cause a denial of service. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2002-0029 to this issue.
These updated packages also fix a dlclose function bug on certain shared libraries, which caused program crashes.
All users of glibc should upgrade to these updated packages, which resolve these issues.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):
120907 - umount passes randmon flags to sys_umount in kernel
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/glibc-2.2.4-32.17.src.rpm
b4d2a8e68ab0c47b20a3e8f28c388011 glibc-2.2.4-32.17.src.rpm
i386:
7089eff3f030f73c37b16691a34a2b97 glibc-2.2.4-32.17.i386.rpm
fb411e71f3ba6fe81f46fa4acbde876f glibc-common-2.2.4-32.17.i386.rpm
93003bc237e963643e84c6b7d63cc97f glibc-devel-2.2.4-32.17.i386.rpm
a3bd7862248bcd16dce99aee952bf68b glibc-profile-2.2.4-32.17.i386.rpm
acd91794ce623d27a77522bd5c750d21 nscd-2.2.4-32.17.i386.rpm
i686:
3759263848efde88bcecb0eb404772ab glibc-2.2.4-32.17.i686.rpm
ia64:
d08bed26e615ddf28be28dbda0ec9d39 glibc-2.2.4-32.17.ia64.rpm
db4c6bf46928d2df68a19ce16e4f2a46 glibc-common-2.2.4-32.17.ia64.rpm
a86dc32711365bfbf1b46e7218b2a413 glibc-devel-2.2.4-32.17.ia64.rpm
8ed7e292bf7d08d2c7a94e48ce6a3bec glibc-profile-2.2.4-32.17.ia64.rpm
0f898c80d110feaebbf115bd3a73a546 nscd-2.2.4-32.17.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/glibc-2.2.4-32.17.src.rpm
b4d2a8e68ab0c47b20a3e8f28c388011 glibc-2.2.4-32.17.src.rpm
ia64:
d08bed26e615ddf28be28dbda0ec9d39 glibc-2.2.4-32.17.ia64.rpm
db4c6bf46928d2df68a19ce16e4f2a46 glibc-common-2.2.4-32.17.ia64.rpm
a86dc32711365bfbf1b46e7218b2a413 glibc-devel-2.2.4-32.17.ia64.rpm
8ed7e292bf7d08d2c7a94e48ce6a3bec glibc-profile-2.2.4-32.17.ia64.rpm
0f898c80d110feaebbf115bd3a73a546 nscd-2.2.4-32.17.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/glibc-2.2.4-32.17.src.rpm
b4d2a8e68ab0c47b20a3e8f28c388011 glibc-2.2.4-32.17.src.rpm
i386:
7089eff3f030f73c37b16691a34a2b97 glibc-2.2.4-32.17.i386.rpm
fb411e71f3ba6fe81f46fa4acbde876f glibc-common-2.2.4-32.17.i386.rpm
93003bc237e963643e84c6b7d63cc97f glibc-devel-2.2.4-32.17.i386.rpm
a3bd7862248bcd16dce99aee952bf68b glibc-profile-2.2.4-32.17.i386.rpm
acd91794ce623d27a77522bd5c750d21 nscd-2.2.4-32.17.i386.rpm
i686:
3759263848efde88bcecb0eb404772ab glibc-2.2.4-32.17.i686.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/glibc-2.2.4-32.17.src.rpm
b4d2a8e68ab0c47b20a3e8f28c388011 glibc-2.2.4-32.17.src.rpm
i386:
7089eff3f030f73c37b16691a34a2b97 glibc-2.2.4-32.17.i386.rpm
fb411e71f3ba6fe81f46fa4acbde876f glibc-common-2.2.4-32.17.i386.rpm
93003bc237e963643e84c6b7d63cc97f glibc-devel-2.2.4-32.17.i386.rpm
a3bd7862248bcd16dce99aee952bf68b glibc-profile-2.2.4-32.17.i386.rpm
acd91794ce623d27a77522bd5c750d21 nscd-2.2.4-32.17.i386.rpm
i686:
3759263848efde88bcecb0eb404772ab glibc-2.2.4-32.17.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key.html#package
7. References:
http://www.kb.cert.org/vuls/id/844360
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0029
8. Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact.html
Copyright 2004 Red Hat, Inc.