![]() |
|
ESB-2004.0802 -- RHSA-2004:586-01 -- Updated glibc packages fix symlink vulnerability |
|
Date: 21 December 2004 Original URL: http://www.auscert.org.au/render.html?cid=55&it=4644 References: ESB-2005.0350 Click here for PGP verifiable version -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2004.0802 -- RHSA-2004:586-01
Updated glibc packages fix symlink vulnerability
21 December 2004
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: glibc
Publisher: Red Hat
Operating System: Red Hat Enterprise Linux AS/ES/WS 3
Red Hat Desktop version 3
Impact: Overwrite Arbitrary Files
Access: Existing Account
CVE Names: CAN-2004-0968
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Updated glibc packages
Advisory ID: RHSA-2004:586-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2004-586.html
Issue date: 2004-12-20
Updated on: 2004-12-20
Product: Red Hat Enterprise Linux
Keywords: glibc
Obsoletes: RHBA-2004:384-11
CVE Names: CAN-2004-0968
- - ---------------------------------------------------------------------
1. Summary:
Updated glibc packages that address several bugs and implement some
enhancements are now available.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 3 - i386, i686, ia64, ppc, ppc64, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, i686, x86_64
Red Hat Enterprise Linux ES version 3 - i386, i686, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, i686, ia64, x86_64
3. Problem description:
The GNU libc packages (known as glibc) contain the standard C libraries
used by applications.
This errata fixes several bugs in the GNU C Library.
Fixes include (in addition to enclosed Bugzilla entries):
- - - fixed 32-bit atomic operations on 64-bit powerpc
- - - fixed -m32 -I /usr/include/nptl compilation on AMD64
- - - NPTL <pthread.h> should now be usable in C++ code or -pedantic -std=c89 C
- - - rwlocks are now available also in the _POSIX_C_SOURCE=200112L namespace
- - - pthread_once is no longer throw(), as the callback routine might throw
- - - pthread_create now correctly returns EAGAIN when thread couldn't be
created because of lack of memory
- - - fixed NPTL stack freeing in case of pthread_create failure with detached
thread
- - - fixed pthread_mutex_timedlock on i386 and AMD64
- - - Itanium gp saving fix in linuxthreads
- - - fixed s390/s390x unwinding tests done during cancellation if stack frames
are small
- - - fixed fnmatch(3) backslash handling
- - - fixed out of memory behaviour of syslog(3)
- - - resolver ID randomization
- - - fixed fim (NaN, NaN)
- - - glob(3) fixes for dangling symlinks
- - - catchsegv fixed to work with both 32-bit and 64-bit binaries on x86-64,
s390x and ppc
- - - fixed reinitialization of _res when using NPTL stack cache
- - - updated bug reporting instructions, removed glibcbug script
- - - fixed infinite loop in iconv with some options
- - - fixed inet_aton return value
- - - CPU friendlier busy waiting in linuxthreads on EM64T and IA-64
- - - avoid blocking/masking debug signal in linuxthreads
- - - fixed locale program output when neither LC_ALL nor LANG is set
- - - fixed using of unitialized memory in localedef
- - - fixed mntent_r escape processing
- - - optimized mtrace script
- - - linuxthread_db fixes on ppc64
- - - cfi instructions in x86-64 linuxthreads vfork
- - - some _POSIX_C_SOURCE=200112L namespace fixes
All users of glibc should upgrade to these updated packages, which resolve
these issues.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
123583 - getnameinfo does not use /etc/hosts for lookup of V4MAPPED addresses
132816 - glibc in RHEL 3 needs to have syslog.c updated to cvs version 1.42
132204 - glibc-nis-performance.patch causes gdm to hang
118574 - malloc exhausts memory to fast in mulithreaded program
127606 - __builtin_expect's prototype does not expect int args; assert feeds it just that
103415 - Weird string in date printing
136726 - RHEL3 U5: execvp fails if ENODEV encountered during PATH search
135234 - Problem with gethostbyaddr with latest UDP
136318 - CAN-2004-0968 temporary file vulnerabilities in catchsegv script
130254 - glibc's traceback() fails when called from an exception handler
116428 - RHEL3 U4: statfs64
132654 - LTC10984 - 1.3.1 Linux JVM hanging on RedHat EL 3 update 3
6. RPMs required:
Red Hat Enterprise Linux AS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/glibc-2.3.2-95.30.src.rpm
d15df5dfa2e74b1a4abbb70e56dd25e4 glibc-2.3.2-95.30.src.rpm
i386:
fe7ce95c7354c232491d6f05cb27395d glibc-2.3.2-95.30.i386.rpm
98de4c318ef0e4febdb58bf41bcea1d8 glibc-common-2.3.2-95.30.i386.rpm
310f94898b51fe70491caa50764ec058 glibc-devel-2.3.2-95.30.i386.rpm
3fb18bb2724baaf3254d9caaad9e7178 glibc-headers-2.3.2-95.30.i386.rpm
636317c552cea1a9630965f6e45f899c glibc-profile-2.3.2-95.30.i386.rpm
236418cf2a6a14cd76476bcac3a8993a glibc-utils-2.3.2-95.30.i386.rpm
64c4149f810e256e8d06b103c0d8c363 nscd-2.3.2-95.30.i386.rpm
i686:
6e2c8d12a10dae784a2f0f8d39af05d1 glibc-2.3.2-95.30.i686.rpm
728500d49aee5022dca86339917da96e nptl-devel-2.3.2-95.30.i686.rpm
ia64:
369fe6766b2a26d6343a926f4c780ef0 glibc-2.3.2-95.30.ia64.rpm
6e2c8d12a10dae784a2f0f8d39af05d1 glibc-2.3.2-95.30.i686.rpm
df3a5511e22cb01ce6b2b5707c533462 glibc-common-2.3.2-95.30.ia64.rpm
cc3df97be2243e442e101b2d9c3fea01 glibc-devel-2.3.2-95.30.ia64.rpm
cd00415e215a6cf6a25ff93163ed7cbe glibc-headers-2.3.2-95.30.ia64.rpm
ca3dc0c2dbfa6b9b71ae381f8a1a9071 glibc-profile-2.3.2-95.30.ia64.rpm
61d769397f3d56f5ca68e3dc39d85183 glibc-utils-2.3.2-95.30.ia64.rpm
e7a7775d1524d0d06293bd70a3219f48 nptl-devel-2.3.2-95.30.ia64.rpm
4f08dd1c11db6642008537f00f052039 nscd-2.3.2-95.30.ia64.rpm
ppc:
35b630a847e98347eb99378e399a4173 glibc-2.3.2-95.30.ppc.rpm
0342f43284d8e5364d40671dd1f39a7f glibc-common-2.3.2-95.30.ppc.rpm
27174c0559d4b834801eaceb0951519b glibc-devel-2.3.2-95.30.ppc.rpm
f2591e55453597b498e6305bf6573dd8 glibc-headers-2.3.2-95.30.ppc.rpm
9aa2fb865c592acc99f619efee28fb91 glibc-profile-2.3.2-95.30.ppc.rpm
d6d6dda1dff4ec5955f5f071448231cb glibc-utils-2.3.2-95.30.ppc.rpm
9eb568271b79c4a74a6c820cec1bccac nptl-devel-2.3.2-95.30.ppc.rpm
6be684c35aca2c6a832e07669dacfa13 nscd-2.3.2-95.30.ppc.rpm
ppc64:
f104ae96d787c07ec040e1d2f3af0e97 glibc-2.3.2-95.30.ppc64.rpm
98efde8788fb7dcfd4b9a6998bb811b0 glibc-devel-2.3.2-95.30.ppc64.rpm
s390:
e5d99ebe60b40dca7df6f422f92c423c glibc-2.3.2-95.30.s390.rpm
2c65559d9f8610664ffbcb746c37f475 glibc-common-2.3.2-95.30.s390.rpm
04353d1ad4afb81c338d1df644e749c1 glibc-devel-2.3.2-95.30.s390.rpm
183b1a623ef6e036f682a37a1f9fa10a glibc-headers-2.3.2-95.30.s390.rpm
43101d9b283ab6a84eb742b7d76bac75 glibc-profile-2.3.2-95.30.s390.rpm
8af2adc42acfa724b3e899209dc9e0a8 glibc-utils-2.3.2-95.30.s390.rpm
6a110224af8cf2bd76f5588439f63b62 nptl-devel-2.3.2-95.30.s390.rpm
90278c8c9895a35425f9cc9bbadeda61 nscd-2.3.2-95.30.s390.rpm
s390x:
035f10c1dea0b14d3016a761716211ae glibc-2.3.2-95.30.s390x.rpm
e5d99ebe60b40dca7df6f422f92c423c glibc-2.3.2-95.30.s390.rpm
7597b0648938e3fec4f1e489358d3edc glibc-common-2.3.2-95.30.s390x.rpm
9db1a132a7c23eae94aa7ccd80c8c14b glibc-devel-2.3.2-95.30.s390x.rpm
04353d1ad4afb81c338d1df644e749c1 glibc-devel-2.3.2-95.30.s390.rpm
6060c9fb082d112ecb2b02b9b12444e7 glibc-headers-2.3.2-95.30.s390x.rpm
d73d83f30399d40abe2420eee6306235 glibc-profile-2.3.2-95.30.s390x.rpm
a7ea709dadb4ec1d04d9d4964a55a18d glibc-utils-2.3.2-95.30.s390x.rpm
8d1f52855b2473a7750eb8280054dd78 nptl-devel-2.3.2-95.30.s390x.rpm
85ed7ba3006ba2ad471a95cfd9d0807d nscd-2.3.2-95.30.s390x.rpm
x86_64:
8fbaabf048605769292dce75ec872c16 glibc-2.3.2-95.30.x86_64.rpm
6e2c8d12a10dae784a2f0f8d39af05d1 glibc-2.3.2-95.30.i686.rpm
50b56f52e724972728bd9c3fe966d09d glibc-common-2.3.2-95.30.x86_64.rpm
1bb80a3b886f01dbaa686d1a35ca587e glibc-devel-2.3.2-95.30.x86_64.rpm
310f94898b51fe70491caa50764ec058 glibc-devel-2.3.2-95.30.i386.rpm
bc8bfbf3e8882548beb3cb5e8b4baa63 glibc-headers-2.3.2-95.30.x86_64.rpm
61bc8045440d3cdbfa424edfb6398d05 glibc-profile-2.3.2-95.30.x86_64.rpm
b44f7d721f2a00f2832f6d973c9f6bf9 glibc-utils-2.3.2-95.30.x86_64.rpm
6ce9f413f4033200d3ece849c57ce908 nptl-devel-2.3.2-95.30.x86_64.rpm
0a246d37cf5b641cca48fff2c1006279 nscd-2.3.2-95.30.x86_64.rpm
Red Hat Desktop version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/glibc-2.3.2-95.30.src.rpm
d15df5dfa2e74b1a4abbb70e56dd25e4 glibc-2.3.2-95.30.src.rpm
i386:
fe7ce95c7354c232491d6f05cb27395d glibc-2.3.2-95.30.i386.rpm
98de4c318ef0e4febdb58bf41bcea1d8 glibc-common-2.3.2-95.30.i386.rpm
310f94898b51fe70491caa50764ec058 glibc-devel-2.3.2-95.30.i386.rpm
3fb18bb2724baaf3254d9caaad9e7178 glibc-headers-2.3.2-95.30.i386.rpm
636317c552cea1a9630965f6e45f899c glibc-profile-2.3.2-95.30.i386.rpm
236418cf2a6a14cd76476bcac3a8993a glibc-utils-2.3.2-95.30.i386.rpm
64c4149f810e256e8d06b103c0d8c363 nscd-2.3.2-95.30.i386.rpm
i686:
6e2c8d12a10dae784a2f0f8d39af05d1 glibc-2.3.2-95.30.i686.rpm
728500d49aee5022dca86339917da96e nptl-devel-2.3.2-95.30.i686.rpm
x86_64:
8fbaabf048605769292dce75ec872c16 glibc-2.3.2-95.30.x86_64.rpm
6e2c8d12a10dae784a2f0f8d39af05d1 glibc-2.3.2-95.30.i686.rpm
50b56f52e724972728bd9c3fe966d09d glibc-common-2.3.2-95.30.x86_64.rpm
1bb80a3b886f01dbaa686d1a35ca587e glibc-devel-2.3.2-95.30.x86_64.rpm
310f94898b51fe70491caa50764ec058 glibc-devel-2.3.2-95.30.i386.rpm
bc8bfbf3e8882548beb3cb5e8b4baa63 glibc-headers-2.3.2-95.30.x86_64.rpm
61bc8045440d3cdbfa424edfb6398d05 glibc-profile-2.3.2-95.30.x86_64.rpm
b44f7d721f2a00f2832f6d973c9f6bf9 glibc-utils-2.3.2-95.30.x86_64.rpm
6ce9f413f4033200d3ece849c57ce908 nptl-devel-2.3.2-95.30.x86_64.rpm
0a246d37cf5b641cca48fff2c1006279 nscd-2.3.2-95.30.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/glibc-2.3.2-95.30.src.rpm
d15df5dfa2e74b1a4abbb70e56dd25e4 glibc-2.3.2-95.30.src.rpm
i386:
fe7ce95c7354c232491d6f05cb27395d glibc-2.3.2-95.30.i386.rpm
98de4c318ef0e4febdb58bf41bcea1d8 glibc-common-2.3.2-95.30.i386.rpm
310f94898b51fe70491caa50764ec058 glibc-devel-2.3.2-95.30.i386.rpm
3fb18bb2724baaf3254d9caaad9e7178 glibc-headers-2.3.2-95.30.i386.rpm
636317c552cea1a9630965f6e45f899c glibc-profile-2.3.2-95.30.i386.rpm
236418cf2a6a14cd76476bcac3a8993a glibc-utils-2.3.2-95.30.i386.rpm
64c4149f810e256e8d06b103c0d8c363 nscd-2.3.2-95.30.i386.rpm
i686:
6e2c8d12a10dae784a2f0f8d39af05d1 glibc-2.3.2-95.30.i686.rpm
728500d49aee5022dca86339917da96e nptl-devel-2.3.2-95.30.i686.rpm
ia64:
369fe6766b2a26d6343a926f4c780ef0 glibc-2.3.2-95.30.ia64.rpm
6e2c8d12a10dae784a2f0f8d39af05d1 glibc-2.3.2-95.30.i686.rpm
df3a5511e22cb01ce6b2b5707c533462 glibc-common-2.3.2-95.30.ia64.rpm
cc3df97be2243e442e101b2d9c3fea01 glibc-devel-2.3.2-95.30.ia64.rpm
cd00415e215a6cf6a25ff93163ed7cbe glibc-headers-2.3.2-95.30.ia64.rpm
ca3dc0c2dbfa6b9b71ae381f8a1a9071 glibc-profile-2.3.2-95.30.ia64.rpm
61d769397f3d56f5ca68e3dc39d85183 glibc-utils-2.3.2-95.30.ia64.rpm
e7a7775d1524d0d06293bd70a3219f48 nptl-devel-2.3.2-95.30.ia64.rpm
4f08dd1c11db6642008537f00f052039 nscd-2.3.2-95.30.ia64.rpm
x86_64:
8fbaabf048605769292dce75ec872c16 glibc-2.3.2-95.30.x86_64.rpm
6e2c8d12a10dae784a2f0f8d39af05d1 glibc-2.3.2-95.30.i686.rpm
50b56f52e724972728bd9c3fe966d09d glibc-common-2.3.2-95.30.x86_64.rpm
1bb80a3b886f01dbaa686d1a35ca587e glibc-devel-2.3.2-95.30.x86_64.rpm
310f94898b51fe70491caa50764ec058 glibc-devel-2.3.2-95.30.i386.rpm
bc8bfbf3e8882548beb3cb5e8b4baa63 glibc-headers-2.3.2-95.30.x86_64.rpm
61bc8045440d3cdbfa424edfb6398d05 glibc-profile-2.3.2-95.30.x86_64.rpm
b44f7d721f2a00f2832f6d973c9f6bf9 glibc-utils-2.3.2-95.30.x86_64.rpm
6ce9f413f4033200d3ece849c57ce908 nptl-devel-2.3.2-95.30.x86_64.rpm
0a246d37cf5b641cca48fff2c1006279 nscd-2.3.2-95.30.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/glibc-2.3.2-95.30.src.rpm
d15df5dfa2e74b1a4abbb70e56dd25e4 glibc-2.3.2-95.30.src.rpm
i386:
fe7ce95c7354c232491d6f05cb27395d glibc-2.3.2-95.30.i386.rpm
98de4c318ef0e4febdb58bf41bcea1d8 glibc-common-2.3.2-95.30.i386.rpm
310f94898b51fe70491caa50764ec058 glibc-devel-2.3.2-95.30.i386.rpm
3fb18bb2724baaf3254d9caaad9e7178 glibc-headers-2.3.2-95.30.i386.rpm
636317c552cea1a9630965f6e45f899c glibc-profile-2.3.2-95.30.i386.rpm
236418cf2a6a14cd76476bcac3a8993a glibc-utils-2.3.2-95.30.i386.rpm
64c4149f810e256e8d06b103c0d8c363 nscd-2.3.2-95.30.i386.rpm
i686:
6e2c8d12a10dae784a2f0f8d39af05d1 glibc-2.3.2-95.30.i686.rpm
728500d49aee5022dca86339917da96e nptl-devel-2.3.2-95.30.i686.rpm
ia64:
369fe6766b2a26d6343a926f4c780ef0 glibc-2.3.2-95.30.ia64.rpm
6e2c8d12a10dae784a2f0f8d39af05d1 glibc-2.3.2-95.30.i686.rpm
df3a5511e22cb01ce6b2b5707c533462 glibc-common-2.3.2-95.30.ia64.rpm
cc3df97be2243e442e101b2d9c3fea01 glibc-devel-2.3.2-95.30.ia64.rpm
cd00415e215a6cf6a25ff93163ed7cbe glibc-headers-2.3.2-95.30.ia64.rpm
ca3dc0c2dbfa6b9b71ae381f8a1a9071 glibc-profile-2.3.2-95.30.ia64.rpm
61d769397f3d56f5ca68e3dc39d85183 glibc-utils-2.3.2-95.30.ia64.rpm
e7a7775d1524d0d06293bd70a3219f48 nptl-devel-2.3.2-95.30.ia64.rpm
4f08dd1c11db6642008537f00f052039 nscd-2.3.2-95.30.ia64.rpm
x86_64:
8fbaabf048605769292dce75ec872c16 glibc-2.3.2-95.30.x86_64.rpm
6e2c8d12a10dae784a2f0f8d39af05d1 glibc-2.3.2-95.30.i686.rpm
50b56f52e724972728bd9c3fe966d09d glibc-common-2.3.2-95.30.x86_64.rpm
1bb80a3b886f01dbaa686d1a35ca587e glibc-devel-2.3.2-95.30.x86_64.rpm
310f94898b51fe70491caa50764ec058 glibc-devel-2.3.2-95.30.i386.rpm
bc8bfbf3e8882548beb3cb5e8b4baa63 glibc-headers-2.3.2-95.30.x86_64.rpm
61bc8045440d3cdbfa424edfb6398d05 glibc-profile-2.3.2-95.30.x86_64.rpm
b44f7d721f2a00f2832f6d973c9f6bf9 glibc-utils-2.3.2-95.30.x86_64.rpm
6ce9f413f4033200d3ece849c57ce908 nptl-devel-2.3.2-95.30.x86_64.rpm
0a246d37cf5b641cca48fff2c1006279 nscd-2.3.2-95.30.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0968
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2004 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQFBxyIIXlSAg2UNWIIRAk7qAKCa+BNjb2QBu9k+SKwTxw5vMQTaKQCggAa9
hxb2MjAtJJiC0ScsKDLHsOA=
=iZRe
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBQcd0ASh9+71yA2DNAQJrtAQAlAhJ9qIgyAfz4hdCFc+H8hXC5Hs9/qb9
TvR9y/F1VbY60X2qRtn54YEbdE2iBcr4L9DVqqmU/cU96fCgKUMecFdYlG4iQJCb
77Bf4vZ/0z56oDhv6HdyDEGebGUYFFuX2TAbt7+mhTS7w7GgExckwSddsLBcSXEJ
MfFUIOLRMZM=
=38pU
-----END PGP SIGNATURE-----
|