Operating System:

Published:

12 November 1998

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
              AUSCERT External Security Bulletin Redistribution
                                    
                    ESB-98.173 -- Red Hat Linux Bulletin
                   SECURITY: new libc 5 packages available
                                    
                              13 November 1998

===========================================================================

Red Hat Software, Inc. has released the following advisory concerning
a buffer overflow vulnerability in the libc 5 packages shipped with Red Hat 
Linux running on Intel and Sparc architectures.  

- --------------------------BEGIN INCLUDED TEXT-------------------

- -----BEGIN PGP SIGNED MESSAGE-----

A buffer overflow has been identified in all versions of the libc 5 packages
shipped with Red Hat Linux. The most affected systems are those that are
libc 5 based (Red Hat Linux 4.2 and older). Only Intel and Sparc
architectures are affected.

The Red Hat Linux 5.x releases are glibc (libc 6) based, and Red Hat does
not ship any binaries linked against libc 5 that might be used for
compromising the system's security. However, Red Hat Linux 5.x releases do
include for backwards compatibility a package containg a vulnerable library.

Users of Red Hat Linux are recommended to upgrade to the new packages
available under updates directory on our ftp site:

Red Hat Linux 4.2:
==================

i386:
rpm -Uvh ftp://updates.redhat.com/4.2/i386/libc-5.3.12-18.4.i386.rpm
rpm -Uvh ftp://updates.redhat.com/4.2/i386/libc-debug-5.3.12-18.4.i386.rpm
rpm -Uvh ftp://updates.redhat.com/4.2/i386/libc-devel-5.3.12-18.4.i386.rpm
rpm -Uvh ftp://updates.redhat.com/4.2/i386/libc-profile-5.3.12-18.4.i386.rpm
rpm -Uvh ftp://updates.redhat.com/4.2/i386/libc-static-5.3.12-18.4.i386.rpm

sparc:
rpm -Uvh ftp://updates.redhat.com/4.2/sparc/libc-5.3.12-18.4.sparc.rpm
rpm -Uvh ftp://updates.redhat.com/4.2/sparc/libc-debug-5.3.12-18.4.sparc.rpm
rpm -Uvh ftp://updates.redhat.com/4.2/sparc/libc-devel-5.3.12-18.4.sparc.rpm
rpm -Uvh ftp://updates.redhat.com/4.2/sparc/libc-profile-5.3.12-18.4.sparc.rpm
rpm -Uvh ftp://updates.redhat.com/4.2/sparc/libc-static-5.3.12-18.4.sparc.rpm

Source rpm:
rpm -Uvh ftp://updates.redhat.com/4.2/SRPMS/libc-5.3.12-18.4.src.rpm


Red Hat Linux 5.0, 5.1 and 5.2:
===============================

i386:
rpm -Uvh ftp://updates.redhat.com/5.2/i386/libc-5.3.12-28.i386.rpm

Source rpm:
rpm -Uvh ftp://updates.redhat.com/5.2/SRPMS/libc-5.3.12-28.src.rpm


- -----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNkt8xfGvxKXU9NkBAQEBuAP8DosSXiiNA5Yi95FpbPtxgBbtzUDHYtfE
8K3mRN2gyXY1LRshUSL1NW8Hxy16+8Y+kKHsBXH9sf4aNqwiEYzV5w+ZjOVIIEVb
xEQOEFMOg6Apni5Zzdct5J4RQuFhH59CCsroacfOVtN0CeqBSKQUenDAJD5F6uod
63xM/eDSqmY=
=WVg+
- -----END PGP SIGNATURE-----

- ---------------------------END INCLUDED TEXT--------------------

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It will
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/Information/advisories.html

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for emergencies.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBNmUyHyh9+71yA2DNAQGtjwP/aK2dn4YADYQNfusx5EfuYPMb1SX2Z/2c
Ot/KCaCxGilb0pqNS/GAsmaFEvW1C3fiihMTSpDSsDDyV6tWrgbZ9nYDIMwBayVU
jgiT7fXJlEV5YJXi5qWO01Y36T9WTjazV5ssDXtmWU/YzMpesG5TAztxKYrf9f8W
dyp+hV2+080=
=ze+S
-----END PGP SIGNATURE-----