Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200707-04 ] GNU C Library: Integer overflow
Date: Fri, 06 Jul 2007 08:02:45
Message-Id: 20070703205259.GG22648@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200707-04
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: GNU C Library: Integer overflow
9 Date: July 03, 2007
10 Bugs: #183844
11 ID: 200707-04
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 An integer overflow in the dynamic loader, ld.so, could result in the
19 execution of arbitrary code with escalated privileges.
20
21 Background
22 ==========
23
24 The GNU C library is the standard C library used by Gentoo Linux
25 systems. It provides programs with basic facilities and interfaces to
26 system calls. ld.so is the dynamic linker which prepares dynamically
27 linked programs for execution by resolving runtime dependencies and
28 related functions.
29
30 Affected packages
31 =================
32
33 -------------------------------------------------------------------
34 Package / Vulnerable / Unaffected
35 -------------------------------------------------------------------
36 1 sys-libs/glibc < 2.5-r4 >= 2.5-r4
37 -------------------------------------------------------------------
38 # Package 1 only applies to x86 users.
39
40 Description
41 ===========
42
43 Tavis Ormandy of the Gentoo Linux Security Team discovered a flaw in
44 the handling of the hardware capabilities mask by the dynamic loader.
45 If a mask is specified with a high population count, an integer
46 overflow could occur when allocating memory.
47
48 Impact
49 ======
50
51 As the hardware capabilities mask is honored by the dynamic loader
52 during the execution of suid and sgid programs, in theory this
53 vulnerability could result in the execution of arbitrary code with root
54 privileges. This update is provided as a precaution against currently
55 unknown attack vectors.
56
57 Workaround
58 ==========
59
60 There is no known workaround at this time.
61
62 Resolution
63 ==========
64
65 All users should upgrade to the latest version:
66
67 # emerge --sync
68 # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.5-r4"
69
70 References
71 ==========
72
73 [ 1 ] CVE-2007-3508
74 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3508
75
76 Availability
77 ============
78
79 This GLSA and any updates to it are available for viewing at
80 the Gentoo Security Website:
81
82 http://security.gentoo.org/glsa/glsa-200707-04.xml
83
84 Concerns?
85 =========
86
87 Security is a primary focus of Gentoo Linux and ensuring the
88 confidentiality and security of our users machines is of utmost
89 importance to us. Any security concerns should be addressed to
90 security@g.o or alternatively, you may file a bug at
91 http://bugs.gentoo.org.
92
93 License
94 =======
95
96 Copyright 2007 Gentoo Foundation, Inc; referenced text
97 belongs to its owner(s).
98
99 The contents of this document are licensed under the
100 Creative Commons - Attribution / Share Alike license.
101
102 http://creativecommons.org/licenses/by-sa/2.5