-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ______________________________________________________________________________ Caldera Systems, Inc. Security Advisory Subject: serious vulnerability in glibc NLS code Advisory number: CSSA-2000-030.0 Issue date: 2000 September, 1 Cross reference: ______________________________________________________________________________ 1. Problem Description The GNU C library, glibc, allows users to specify their so-called locale through environment variables such as LANG. The locale determines what language, monetary signs etc to use when communicating with the user. A bug in the parsing of these locale names allows an attacker to trick glibc into using locale information files provided by the attacker, which can make an application crash. This bug can be used by local users to obtain root privilege through various setuid root applications. 2. Vulnerable Versions System Package ----------------------------------------------------------- OpenLinux Desktop 2.3 All packages previous to glibc-2.1.1-3 OpenLinux eServer 2.3 All packages previous to and OpenLinux eBuilder glibc-2.1.3-4S OpenLinux eDesktop 2.4 All packages previous to glibc-2.1.2-7 3. Solution Workaround: None known. 4. OpenLinux Desktop 2.3 4.1 Location of Fixed Packages The upgrade packages can be found on Caldera's FTP site at: ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/ The corresponding source code package can be found at: ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/SRPMS 4.2 Verification 9509340276c43bdcbeee2d95e82b9d03 RPMS/glibc-2.1.1-3.i386.rpm e7d4b0f9db9b92af32b224d7e1b83511 RPMS/glibc-devel-2.1.1-3.i386.rpm b2fac2bcf6e961d7fc5f4071be2cd934 RPMS/glibc-devel-static-2.1.1-3.i386.rpm 3883f85e36804e8a25f5c8f1d5644a18 RPMS/glibc-localedata-2.1.1-3.i386.rpm 8c155c6564b725d09c9c2b4109212774 SRPMS/glibc-2.1.1-3.src.rpm 4.3 Installing Fixed Packages Upgrade the affected packages with the following commands: rpm -Fhv glibc-*.i386.rpm 5. OpenLinux eServer 2.3 and OpenLinux eBuilder for ECential 3.0 5.1 Location of Fixed Packages The upgrade packages can be found on Caldera's FTP site at: ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/ The corresponding source code package can be found at: ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS 5.2 Verification 083a50ef11461be5925c139ab1754e78 RPMS/glibc-2.1.3-4S.i386.rpm d47e1eef4448514d3d6163acf6752a33 RPMS/glibc-devel-2.1.3-4S.i386.rpm c2534552c30464f4d7a5b35a909dd2da RPMS/glibc-devel-static-2.1.3-4S.i386.rpm 87e72a76353c38dd856e48199d03a965 RPMS/glibc-localedata-2.1.3-4S.i386.rpm 24dc7d444ed055987af0fdf86ac43e6e SRPMS/glibc-2.1.3-4S.src.rpm 5.3 Installing Fixed Packages Upgrade the affected packages with the following commands: rpm -Fhv glibc-*i386.rpm 6. OpenLinux eDesktop 2.4 6.1 Location of Fixed Packages The upgrade packages can be found on Caldera's FTP site at: ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/ The corresponding source code package can be found at: ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS 6.2 Verification d8729cd44a58ee64b1e771bee3cbafb2 RPMS/glibc-2.1.2-7.i386.rpm e9138f01f763a454598cf5832ef43327 RPMS/glibc-devel-2.1.2-7.i386.rpm c0a617bf52890fdae7351bcc293540b2 RPMS/glibc-devel-static-2.1.2-7.i386.rpm 704b41eab208e9991f0248ff0c54db54 RPMS/glibc-localedata-2.1.2-7.i386.rpm 29820d97b016f0143528f49eb85ef405 SRPMS/glibc-2.1.2-7.src.rpm 6.3 Installing Fixed Packages Upgrade the affected packages with the following commands: rpm -Fhv glibc-*i386.rpm 7. References This and other Caldera security resources are located at: http://www.calderasystems.com/support/security/index.html This security fix closes Caldera's internal Problem Report 7602. 8. Disclaimer Caldera Systems, Inc. is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of Caldera OpenLinux. 9. Acknowledgements Caldera Systems wishes to thank Jouko Pynnönen for finding and reporting this problem. ______________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.1 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE5r9wV18sy83A/qfwRAvCdAJ9T30jQ8Xz6Jr6TXFes6rzkdsoMnACgqhTp 7j/S/7YSFxYO2X6sCxoqRAc= =8a0Y -----END PGP SIGNATURE-----