Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: February 27th, 2015
Linux Security Week: February 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Slackware: glibc buffer overflow vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by Team   
Slackware An integer overflow in the xdrmem_getbytes() function found in the glibc library has been fixed.

[slackware-security]  glibc XDR overflow fix (SSA:2003-141-03)

An integer overflow in the xdrmem_getbytes() function found in the glibc
library has been fixed.  This could allow a remote attacker to execute
arbitrary code by exploiting RPC service that use xdrmem_getbytes().  None of
the default RPC services provided by Slackware  appear to use this function,
but third-party applications may make use of it.

We recommend upgrading to these new glibc packages.

Here are the details from the Slackware 9.0 ChangeLog:
Tue May 20 20:13:09 PDT 2003
patches/packages/glibc-2.3.1-i386-4.tgz:  Patched, recompiled.
  (* Security fix *)
patches/packages/glibc-debug-2.3.1-i386-4.tgz:  Patched, recompiled.
  (* Security fix *)
patches/packages/glibc-i18n-2.3.1-noarch-4.tgz:  Rebuilt.
patches/packages/glibc-profile-2.3.1-i386-4.tgz:  Patched, recompiled.
  (* Security fix *)
patches/packages/glibc-solibs-2.3.1-i386-4.tgz:  Patched a buffer overflow in
  some dead code (xdrmem_getbytes(), which we couldn't find used by anything,
  but it doesn't hurt to patch it anyway)
  (* Security fix *)
patches/packages/glibc-zoneinfo-2.3.1-noarch-4.tgz:  Rebuilt.


Updated packages for Slackware 8.1:

Updated packages for Slackware 9.0:


Slackware 8.1 packages:
ae235701abcccdc726789c9af5a0eb7b  glibc-2.2.5-i386-4.tgz
83714476158d8f93a1f597bfdc6945e7  glibc-solibs-2.2.5-i386-4.tgz

Slackware 9.0 packages:
98fb90ce972b42bf5731bc71a722832a  glibc-2.3.1-i386-4.tgz
9f2c944389f25dfe1c1dcb13210d9dc4  glibc-debug-2.3.1-i386-4.tgz
fa9fe934fe1dde4c134021e39aadaf7e  glibc-i18n-2.3.1-noarch-4.tgz
1b264af8e047fa9378169bb4f8a9836f  glibc-profile-2.3.1-i386-4.tgz
7c31f7602c54262c1e3ae16e59f8e0d6  glibc-solibs-2.3.1-i386-4.tgz
35b89aa808f4e7c8424f50eab73d824a  glibc-zoneinfo-2.3.1-noarch-4.tgz


Upgrade using upgradepkg (as root):

upgradepkg glibc-*.tgz


Slackware Linux Security Team

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
D-Link Routers Haunted by Remote Command Injection Bug -
Mozilla Pushes Hot Fix to Remove Superfish Cert From Firefox
The Deadly Game of Cyber Mis-Attribution
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.