[LWN Logo]
[Timeline]
Date: Tue, 5 Sep 2000 09:07:28 -0600
From: Technical Support <support@phoenix.calderasystems.com>
To: announce@lists.calderasystems.com, bugtraq@securityfocus.com,
Subject: Security Update: serious vulnerability in glibc NLS code


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________
		   Caldera Systems, Inc.  Security Advisory

Subject:		serious vulnerability in glibc NLS code
Advisory number: 	CSSA-2000-030.0
Issue date: 		2000 September, 1
Cross reference:
______________________________________________________________________________


1. Problem Description

   The GNU C library, glibc, allows users to specify their so-called
   locale through environment variables such as LANG. The locale
   determines what language, monetary signs etc to use when
   communicating with the user.
 
   A bug in the parsing of these locale names allows an attacker to
   trick glibc into using locale information files provided by the
   attacker, which can make an application crash.
 
   This bug can be used by local users to obtain root privilege
   through various setuid root applications.
 
2. Vulnerable Versions

   System                       Package
   -----------------------------------------------------------
   OpenLinux Desktop 2.3        All packages previous to
   				glibc-2.1.1-3

   OpenLinux eServer 2.3        All packages previous to
   and OpenLinux eBuilder       glibc-2.1.3-4S

   OpenLinux eDesktop 2.4	All packages previous to
                                glibc-2.1.2-7

3. Solution

   Workaround:

   None known.

4. OpenLinux Desktop 2.3

   4.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/

       The corresponding source code package can be found at:

       ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/SRPMS

   4.2 Verification

   9509340276c43bdcbeee2d95e82b9d03  RPMS/glibc-2.1.1-3.i386.rpm
   e7d4b0f9db9b92af32b224d7e1b83511  RPMS/glibc-devel-2.1.1-3.i386.rpm
   b2fac2bcf6e961d7fc5f4071be2cd934  RPMS/glibc-devel-static-2.1.1-3.i386.rpm
   3883f85e36804e8a25f5c8f1d5644a18  RPMS/glibc-localedata-2.1.1-3.i386.rpm
   8c155c6564b725d09c9c2b4109212774  SRPMS/glibc-2.1.1-3.src.rpm

   4.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

	  rpm -Fhv glibc-*.i386.rpm

5. OpenLinux eServer 2.3 and OpenLinux eBuilder for ECential 3.0

   5.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/

       The corresponding source code package can be found at:

       ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS

   5.2 Verification

   083a50ef11461be5925c139ab1754e78  RPMS/glibc-2.1.3-4S.i386.rpm
   d47e1eef4448514d3d6163acf6752a33  RPMS/glibc-devel-2.1.3-4S.i386.rpm
   c2534552c30464f4d7a5b35a909dd2da  RPMS/glibc-devel-static-2.1.3-4S.i386.rpm
   87e72a76353c38dd856e48199d03a965  RPMS/glibc-localedata-2.1.3-4S.i386.rpm
   24dc7d444ed055987af0fdf86ac43e6e  SRPMS/glibc-2.1.3-4S.src.rpm

   5.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

	  rpm -Fhv glibc-*i386.rpm

6. OpenLinux eDesktop 2.4

   6.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/

       The corresponding source code package can be found at:

       ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS

   6.2 Verification

   d8729cd44a58ee64b1e771bee3cbafb2  RPMS/glibc-2.1.2-7.i386.rpm
   e9138f01f763a454598cf5832ef43327  RPMS/glibc-devel-2.1.2-7.i386.rpm
   c0a617bf52890fdae7351bcc293540b2  RPMS/glibc-devel-static-2.1.2-7.i386.rpm
   704b41eab208e9991f0248ff0c54db54  RPMS/glibc-localedata-2.1.2-7.i386.rpm
   29820d97b016f0143528f49eb85ef405  SRPMS/glibc-2.1.2-7.src.rpm                   
   6.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

	  rpm -Fhv glibc-*i386.rpm

7. References

   This and other Caldera security resources are located at:

   http://www.calderasystems.com/support/security/index.html

   This security fix closes Caldera's internal Problem Report 7602.

8. Disclaimer

   Caldera Systems, Inc. is not responsible for the misuse of any of the
   information we provide on this website and/or through our security
   advisories. Our advisories are a service to our customers intended to
   promote secure installation and use of Caldera OpenLinux.

9. Acknowledgements

   Caldera Systems wishes to thank Jouko Pynnönen <jouko@solutions.fi>
   for finding and reporting this problem.                                         

______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE5r9wV18sy83A/qfwRAvCdAJ9T30jQ8Xz6Jr6TXFes6rzkdsoMnACgqhTp
7j/S/7YSFxYO2X6sCxoqRAc=
=8a0Y
-----END PGP SIGNATURE-----