Red Hat Security Advisory

Synopsis:          Updated glibc packages fix flaws
Advisory ID:       RHSA-2004:383-01
Issue date:        2004-08-04
Updated on:        2004-08-04
Product:           Red Hat Enterprise Linux
Keywords:          glibc libdl ld.so dlclose umount
CVE Names:         CAN-2002-0029
- ---------------------------------------------------------------------

1. Summary:

Updated glibc packages that fix a security flaw in the resolver as well as
dlclose handling are now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, i686, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386, i686
Red Hat Enterprise Linux WS version 2.1 - i386, i686

3. Problem description:

The GNU libc packages (known as glibc) contain the standard C libraries
used by applications.

A security audit of the glibc packages in Red Hat Enterprise Linux 2.1
found a flaw in the resolver library which was originally reported as
affecting versions of ISC BIND 4.9.  This flaw also applied to glibc
versions before 2.3.2.  An attacker who is able to send DNS responses
(perhaps by creating a malicious DNS server) could remotely exploit this
vulnerability to execute arbitrary code or cause a denial of service.  The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2002-0029 to this issue.

These updated packages also fix a dlclose function bug on certain shared
libraries, which caused program crashes.

All users of glibc should upgrade to these updated packages, which
resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

     http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed  (http://bugzilla.redhat.com/ for more info):

120907 - umount passes randmon flags to sys_umount in kernel

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS: 

b4d2a8e68ab0c47b20a3e8f28c388011  glibc-2.2.4-32.17.src.rpm

i386:
7089eff3f030f73c37b16691a34a2b97  glibc-2.2.4-32.17.i386.rpm
fb411e71f3ba6fe81f46fa4acbde876f  glibc-common-2.2.4-32.17.i386.rpm
93003bc237e963643e84c6b7d63cc97f  glibc-devel-2.2.4-32.17.i386.rpm
a3bd7862248bcd16dce99aee952bf68b  glibc-profile-2.2.4-32.17.i386.rpm
acd91794ce623d27a77522bd5c750d21  nscd-2.2.4-32.17.i386.rpm

i686:
3759263848efde88bcecb0eb404772ab  glibc-2.2.4-32.17.i686.rpm

ia64:
d08bed26e615ddf28be28dbda0ec9d39  glibc-2.2.4-32.17.ia64.rpm
db4c6bf46928d2df68a19ce16e4f2a46  glibc-common-2.2.4-32.17.ia64.rpm
a86dc32711365bfbf1b46e7218b2a413  glibc-devel-2.2.4-32.17.ia64.rpm
8ed7e292bf7d08d2c7a94e48ce6a3bec  glibc-profile-2.2.4-32.17.ia64.rpm
0f898c80d110feaebbf115bd3a73a546  nscd-2.2.4-32.17.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS: 

b4d2a8e68ab0c47b20a3e8f28c388011  glibc-2.2.4-32.17.src.rpm

ia64:
d08bed26e615ddf28be28dbda0ec9d39  glibc-2.2.4-32.17.ia64.rpm
db4c6bf46928d2df68a19ce16e4f2a46  glibc-common-2.2.4-32.17.ia64.rpm
a86dc32711365bfbf1b46e7218b2a413  glibc-devel-2.2.4-32.17.ia64.rpm
8ed7e292bf7d08d2c7a94e48ce6a3bec  glibc-profile-2.2.4-32.17.ia64.rpm
0f898c80d110feaebbf115bd3a73a546  nscd-2.2.4-32.17.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS: 

b4d2a8e68ab0c47b20a3e8f28c388011  glibc-2.2.4-32.17.src.rpm

i386:
7089eff3f030f73c37b16691a34a2b97  glibc-2.2.4-32.17.i386.rpm
fb411e71f3ba6fe81f46fa4acbde876f  glibc-common-2.2.4-32.17.i386.rpm
93003bc237e963643e84c6b7d63cc97f  glibc-devel-2.2.4-32.17.i386.rpm
a3bd7862248bcd16dce99aee952bf68b  glibc-profile-2.2.4-32.17.i386.rpm
acd91794ce623d27a77522bd5c750d21  nscd-2.2.4-32.17.i386.rpm

i686:
3759263848efde88bcecb0eb404772ab  glibc-2.2.4-32.17.i686.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS: 

b4d2a8e68ab0c47b20a3e8f28c388011  glibc-2.2.4-32.17.src.rpm

i386:
7089eff3f030f73c37b16691a34a2b97  glibc-2.2.4-32.17.i386.rpm
fb411e71f3ba6fe81f46fa4acbde876f  glibc-common-2.2.4-32.17.i386.rpm
93003bc237e963643e84c6b7d63cc97f  glibc-devel-2.2.4-32.17.i386.rpm
a3bd7862248bcd16dce99aee952bf68b  glibc-profile-2.2.4-32.17.i386.rpm
acd91794ce623d27a77522bd5c750d21  nscd-2.2.4-32.17.i386.rpm

i686:
3759263848efde88bcecb0eb404772ab  glibc-2.2.4-32.17.i686.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
 

7. References:
 
cert 
CVE -CVE-2002-0029

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at  

Copyright 2004 Red Hat, Inc.

Red Hat: glibc Multiple vulnerabilities

Updated glibc packages that fix a security flaw in the resolver as well as dlclose handling are now available.

Summary



Summary

The GNU libc packages (known as glibc) contain the standard C librariesused by applications.A security audit of the glibc packages in Red Hat Enterprise Linux 2.1found a flaw in the resolver library which was originally reported asaffecting versions of ISC BIND 4.9. This flaw also applied to glibcversions before 2.3.2. An attacker who is able to send DNS responses(perhaps by creating a malicious DNS server) could remotely exploit thisvulnerability to execute arbitrary code or cause a denial of service. TheCommon Vulnerabilities and Exposures project (cve.mitre.org) has assignedthe name CAN-2002-0029 to this issue.These updated packages also fix a dlclose function bug on certain sharedlibraries, which caused program crashes.All users of glibc should upgrade to these updated packages, whichresolve these issues.


Solution

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):
120907 - umount passes randmon flags to sys_umount in kernel
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
b4d2a8e68ab0c47b20a3e8f28c388011 glibc-2.2.4-32.17.src.rpm
i386: 7089eff3f030f73c37b16691a34a2b97 glibc-2.2.4-32.17.i386.rpm fb411e71f3ba6fe81f46fa4acbde876f glibc-common-2.2.4-32.17.i386.rpm 93003bc237e963643e84c6b7d63cc97f glibc-devel-2.2.4-32.17.i386.rpm a3bd7862248bcd16dce99aee952bf68b glibc-profile-2.2.4-32.17.i386.rpm acd91794ce623d27a77522bd5c750d21 nscd-2.2.4-32.17.i386.rpm
i686: 3759263848efde88bcecb0eb404772ab glibc-2.2.4-32.17.i686.rpm
ia64: d08bed26e615ddf28be28dbda0ec9d39 glibc-2.2.4-32.17.ia64.rpm db4c6bf46928d2df68a19ce16e4f2a46 glibc-common-2.2.4-32.17.ia64.rpm a86dc32711365bfbf1b46e7218b2a413 glibc-devel-2.2.4-32.17.ia64.rpm 8ed7e292bf7d08d2c7a94e48ce6a3bec glibc-profile-2.2.4-32.17.ia64.rpm 0f898c80d110feaebbf115bd3a73a546 nscd-2.2.4-32.17.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
b4d2a8e68ab0c47b20a3e8f28c388011 glibc-2.2.4-32.17.src.rpm
ia64: d08bed26e615ddf28be28dbda0ec9d39 glibc-2.2.4-32.17.ia64.rpm db4c6bf46928d2df68a19ce16e4f2a46 glibc-common-2.2.4-32.17.ia64.rpm a86dc32711365bfbf1b46e7218b2a413 glibc-devel-2.2.4-32.17.ia64.rpm 8ed7e292bf7d08d2c7a94e48ce6a3bec glibc-profile-2.2.4-32.17.ia64.rpm 0f898c80d110feaebbf115bd3a73a546 nscd-2.2.4-32.17.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
b4d2a8e68ab0c47b20a3e8f28c388011 glibc-2.2.4-32.17.src.rpm
i386: 7089eff3f030f73c37b16691a34a2b97 glibc-2.2.4-32.17.i386.rpm fb411e71f3ba6fe81f46fa4acbde876f glibc-common-2.2.4-32.17.i386.rpm 93003bc237e963643e84c6b7d63cc97f glibc-devel-2.2.4-32.17.i386.rpm a3bd7862248bcd16dce99aee952bf68b glibc-profile-2.2.4-32.17.i386.rpm acd91794ce623d27a77522bd5c750d21 nscd-2.2.4-32.17.i386.rpm
i686: 3759263848efde88bcecb0eb404772ab glibc-2.2.4-32.17.i686.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
b4d2a8e68ab0c47b20a3e8f28c388011 glibc-2.2.4-32.17.src.rpm
i386: 7089eff3f030f73c37b16691a34a2b97 glibc-2.2.4-32.17.i386.rpm fb411e71f3ba6fe81f46fa4acbde876f glibc-common-2.2.4-32.17.i386.rpm 93003bc237e963643e84c6b7d63cc97f glibc-devel-2.2.4-32.17.i386.rpm a3bd7862248bcd16dce99aee952bf68b glibc-profile-2.2.4-32.17.i386.rpm acd91794ce623d27a77522bd5c750d21 nscd-2.2.4-32.17.i386.rpm
i686: 3759263848efde88bcecb0eb404772ab glibc-2.2.4-32.17.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from

Package List


Severity
Advisory ID: RHSA-2004:383-01
Issued Date: : 2004-08-04
Updated on: 2004-08-04
Product: Red Hat Enterprise Linux
Keywords: glibc libdl ld.so dlclose umount
CVE Names: CAN-2002-0029

Topic

Updated glibc packages that fix a security flaw in the resolver as well asdlclose handling are now available.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, i686, ia64

Red Hat Linux Advanced Workstation 2.1 - ia64

Red Hat Enterprise Linux ES version 2.1 - i386, i686

Red Hat Enterprise Linux WS version 2.1 - i386, i686


Bugs Fixed


Related News