Gentoo Archives: gentoo-user-es

From: Daniel Ahlberg <aliz@g.o>
To: gentoo-announce@g.o
Subject: [gentoo-user-es] [gentoo-announce] GLSA: dietlibc
Date: Fri, 27 Sep 2002 05:06:09
Message-Id: 200209271205.16047.aliz@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - --------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT
6 - - --------------------------------------------------------------------
7
8 PACKAGE :dietlibc
9 SUMMARY :integer overflow
10 DATE :2002-09-27 10:00 UTC
11
12 - - --------------------------------------------------------------------
13
14 There is an integer overflow present in the xdr_array() function
15 distributed as part of the Sun Microsystems XDR library. This overflow
16 has been shown to lead to remotely exploitable buffer overflows in
17 multiple applications, leading to the execution of arbitrary code.
18 Although the library was originally distributed by Sun Microsystems,
19 multiple vendors have included the vulnerable code in their own
20 implementations.
21
22 DETAIL
23
24 The XDR (external data representation) libraries are used to provide
25 platform-independent methods for sending data from one system process to
26 another, typically over a network connection. Such routines are commonly
27 used in remote procedure call (RPC) implementations to provide transparency
28 to application programmers who need to use common interfaces to interact
29 with many different types of systems. The xdr_array() function in the XDR
30 library provided by Sun Microsystems contains an integer overflow that can
31 lead to improperly sized dynamic memory allocation. Subsequent problems like
32 buffer overflows may result, depending on how and where the vulnerable
33 xdr_array() function is used.
34
35 More information can be found at:
36
37 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2002-0391
38 http://www.kb.cert.org/vuls/id/192995
39
40 SOLUTION
41
42 It is recommended that all Gentoo Linux users who are running
43 dev-libs/dietlibc-0.16 and earlier update their systems
44 as follows:
45
46 emerge rsync
47 emerge dietlibc
48 emerge clean
49
50 - - --------------------------------------------------------------------
51 aliz@g.o - GnuPG key is available at www.gentoo.org/~aliz
52 - - --------------------------------------------------------------------
53 -----BEGIN PGP SIGNATURE-----
54 Version: GnuPG v1.0.7 (GNU/Linux)
55
56 iD8DBQE9lC1afT7nyhUpoZMRAtz6AKCAuA7Hphva+b6f1okSUzhfNKRbBQCgnKrC
57 abZhfSDhOq+NXnH6/qiZAdg=
58 =Yk0h
59 -----END PGP SIGNATURE-----
60
61 _______________________________________________
62 gentoo-announce mailing list
63 gentoo-announce@g.o
64 http://lists.gentoo.org/mailman/listinfo/gentoo-announce