Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 10421 - sys-libs/glibc
Summary: sys-libs/glibc
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: x86 Linux
: Lowest critical (vote)
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2002-11-08 01:50 UTC by Daniel Ahlberg (RETIRED)
Modified: 2011-10-30 22:38 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
proposed gentoo-x86/sys-libs/ glibc/files/2.2.5/glibc-2.2.5-maxpacket.diff (glibc-2.2.5-maxpacket.diff,9.68 KB, patch)
2002-11-26 06:46 UTC, Stefan Paletta
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Daniel Ahlberg (RETIRED) gentoo-dev 2002-11-08 01:50:35 UTC
From: 
bugzilla@redhat.com


To: 
redhat-watch-list@redhat.com, redhat-announce-list@redhat.com


Date: 
Wed, 6 Nov 2002 19:58 -0500


---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          Updated glibc packages fix vulnerabilities in resolver
Advisory ID:       RHSA-2002:197-09
Issue date:        2002-09-10
Updated on:        2002-11-06
Product:           Red Hat Linux
Keywords:          glibc resolv DNS
Cross references:  
Obsoletes:         RHSA-2002:166-07
CVE Names:         CAN-2002-1146
---------------------------------------------------------------------

1. Topic:

Updated glibc packages are available to fix a buffer overflow in the
resolver.

2. Relevant releases/architectures:

Red Hat Linux 6.2 - alpha, i386, sparc, sparcv9
Red Hat Linux 7.0 - alpha, alphaev6, i386, i686
Red Hat Linux 7.1 - alpha, alphaev6, i386, i686, ia64
Red Hat Linux 7.2 - i386, i686, ia64
Red Hat Linux 7.3 - i386, i686

3. Problem description:

The GNU C library package, glibc, contains standard libraries used by
multiple programs on the system.

A read buffer overflow vulnerability exists in the glibc resolver code in
versions of glibc up to and including 2.2.5.  The vulnerability is
triggered by DNS packets larger than 1024 bytes and can cause applications
to crash.

All Red Hat Linux users are advised to upgrade to these errata packages
which contain a patch to correct this vulnerability.

This errata has been updated to work with programs querying DNS from
extremely small stack sizes, such as MySQL.
Comment 1 Stefan Paletta 2002-11-26 06:46:30 UTC
Created attachment 5961 [details, diff]
proposed gentoo-x86/sys-libs/ glibc/files/2.2.5/glibc-2.2.5-maxpacket.diff

Adopted from RedHat; fixes the security issue and the stack size problem the
vendor patch caused.
Comment 2 Daniel Ahlberg (RETIRED) gentoo-dev 2002-12-09 02:58:23 UTC
Martin, any thoughts or comments on this one?
Comment 3 Martin Schlemmer (RETIRED) gentoo-dev 2002-12-09 13:32:02 UTC
I am guessing if its a problem for redhat, it will be a general issue.  Problem
though is if its same for 2.3.1 ... Daniel, did anybody else have this SA ?
Comment 4 Martin Schlemmer (RETIRED) gentoo-dev 2002-12-23 14:49:02 UTC
Err, is this thing going anywhere ?  Dont really run 2.2.5 myself anymore,
but if it apply clean, cannot see why not to add it ?
Comment 5 Daniel Ahlberg (RETIRED) gentoo-dev 2002-12-27 13:32:32 UTC
I've looked around and I haven't seen any other distributions giving out advisories 
about this specific matter. Martin, I'll leave it up to you to apply this as you are the 
one most familiar with the glibc ebuilds. 
Comment 6 Martin Schlemmer (RETIRED) gentoo-dev 2002-12-27 16:28:18 UTC
Ditto, not even Mandrake has it, and they usually sync with Redhat once every
few weeks.  Ill have a look at what other patches Redhat have in there.  Might
be that they patches for something else, that broke this.

Not high priority right now, as 1.4 are keeping me busy.
Comment 7 solar (RETIRED) gentoo-dev 2003-08-15 14:05:25 UTC
Can this bug be closed now?
Comment 8 solar (RETIRED) gentoo-dev 2003-10-13 19:41:23 UTC
Alright I'm closing this anyway.. version is just old and it's all good now.