Yellow Dog Linux Security Announcement -------------------------------------- Package: glibc Issue Date: August 1, 2002 Priority: medium Advisory ID: YDU-20020801-2 1. Topic: Updated glibc packages are available. 2. Problem: "The glibc package contains standard libraries which are used by multiple programs on the system. A buffer overflow vulnerability has been found in the way the glibc resolver handles the resolution of network names and addresses via DNS (as per Internet RFC 1011). Version 2.2.5 of glibc and earlier versions are affected. A system would be vulnerable to this issue if the "networks" database in /etc/nsswitch.conf includes the "dns" entry. By default, [Yellow Dog] Linux ships with "networks" set to "files" and is therefore not vulnerable to this issue. (CAN-2002-0684)" (from Red Hat Advisory) 3. Solution: a) Updating via apt... We suggest that you use the apt-get program to keep your system up-to-date. The following command(s) will retrieve and install the fixed version of this update onto your system: apt-get update apt-get install glibc b) Updating manually... Download the updates below for your version of Yellow Dog Linux and then run the following rpm command. (Please use a mirror site) rpm -Fvh [filenames] Yellow Dog Linux 2.3 ftp://ftp.yellowdoglinux.com/pub/yellowdog/updates/yellowdog-2.3/ ppc/glibc-2.2.5-1.2.3a.ppc.rpm ppc/glibc-common-2.2.5-1.2.3a.ppc.rpm ppc/glibc-devel-2.2.5-1.2.3a.ppc.rpm ppc/glibc-profile-2.2.5-1.2.3a.ppc.rpm ppc/nscd-2.2.5-1.2.3a.ppc.rpm Yellow Dog Linux 2.2 ftp://ftp.yellowdoglinux.com/pub/yellowdog/updates/yellowdog-2.2/ ppc/glibc-2.2.5-1.2.2a.ppc.rpm ppc/glibc-common-2.2.5-1.2.2a.ppc.rpm ppc/glibc-devel-2.2.5-1.2.2a.ppc.rpm ppc/glibc-profile-2.2.5-1.2.2a.ppc.rpm ppc/nscd-2.2.5-1.2.2a.ppc.rpm 4. Verification MD5 checksum Package -------------------------------- ---------------------------- [Yellow Dog Linux 2.3] e75df29971655f990a6a5b9a98924f37 ppc/glibc-2.2.5-1.2.3a.ppc.rpm a9bc63468bd7c91fae2321c99c2c5a4a ppc/glibc-common-2.2.5-1.2.3a.ppc.rpm fdfe07b747a5745ea17a68ac3a02703f ppc/glibc-devel-2.2.5-1.2.3a.ppc.rpm d4231fe4c2f3e35ddfc0be090d6fd042 ppc/glibc-profile-2.2.5-1.2.3a.ppc.rpm 3e8ef6492b919a7312aa2159e72e4893 ppc/nscd-2.2.5-1.2.3a.ppc.rpm 86079e5b9e2c110e73f5f08c0c8079f5 SRPMS/glibc-2.2.5-1.2.3a.src.rpm [Yellow Dog Linux 2.2] 5a9e8dfcfa6a076d7eababf41ace3c38 ppc/glibc-2.2.5-1.2.2a.ppc.rpm e4da9a723e183a2c4622bafbbe1ce8ad ppc/glibc-common-2.2.5-1.2.2a.ppc.rpm e4de3964877bb9a10a70007d1052bacc ppc/glibc-devel-2.2.5-1.2.2a.ppc.rpm 03e9e72db5d632a07aabcc48240bc918 ppc/glibc-profile-2.2.5-1.2.2a.ppc.rpm 1696491d9b6470f088b54e0b30bbb020 ppc/nscd-2.2.5-1.2.2a.ppc.rpm 188ba4de2de082a64669b798cd83addd SRPMS/glibc-2.2.5-1.2.2a.src.rpm I wish to verify that each package has not been corrupted or tampered with, examine the md5sum with the following command: rpm --checksig --nogpg filename 5. Misc. Terra Soft has setup a moderated mailing list where these security, bugfix, and package enhancement announcements will be posted. See http://lists.yellowdoglinux.com/ for more information. For information regarding the usage of apt-get, see: http://www.yellowdoglinux.com/support/solutions/ydl_general/apt-get.shtml