rhsa-2003_325
Vulnerability from csaf_redhat
Published
2003-11-12 16:19
Modified
2024-11-21 22:53
Summary
Red Hat Security Advisory: : Updated glibc packages provide security and bug fixes

Notes

Topic
Updated glibc packages that resolve vulnerabilities and address several bugs are now available.
Details
The glibc packages contain GNU libc, which provides standard system libraries. A bug in the getgrouplist function can cause a buffer overflow if the size of the group list is too small to hold all the user's groups. This overflow can cause segmentation faults in user applications, which may have security implications, depending on the application in question. This vulnerability exists only when an administrator has placed a user in a number of groups larger than that expected by an application. Therefore, there is no risk in instances where users are members of few groups. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0689 to this issue. Herbert Xu reported that various applications can accept spoofed messages sent on the kernel netlink interface by other users on the local machine. This could lead to a local denial of service attack. In Red Hat Linux 9 and later, the glibc function getifaddrs uses netlink and could therefore be vulnerable to this issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0859 to this issue. In addition to the security issues, a number of other bugs were fixed. Users are advised to upgrade to these erratum packages, which contain a patch that checks that netlink messages actually came from the kernel, a backported security patch for the getgroups list vulnerability, and patches for the various bug fixes. [Update 2003-11-13]: The packages for Red Hat Linux 9 have been updated for compatibility with kernels not provided by Red Hat.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated glibc packages that resolve vulnerabilities and address several bugs\nare now available.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The glibc packages contain GNU libc, which provides standard system libraries.\n\nA bug in the getgrouplist function can cause a buffer overflow if\nthe size of the group list is too small to hold all the user\u0027s groups.\nThis overflow can cause segmentation faults in user applications, which may\nhave security implications, depending on the application in question. This\nvulnerability exists only when an administrator has placed a user in a\nnumber of groups larger than that expected by an application. Therefore,\nthere is no risk in instances where users are members of few groups. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2003-0689 to this issue.\n\nHerbert Xu reported that various applications can accept spoofed messages\nsent on the kernel netlink interface by other users on the local machine.\nThis could lead to a local denial of service attack.  In Red Hat Linux 9\nand later, the glibc function getifaddrs uses netlink and could therefore\nbe vulnerable to this issue.  The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CAN-2003-0859 to this issue.\n\nIn addition to the security issues, a number of other bugs were fixed.\n\nUsers are advised to upgrade to these erratum packages, which contain a\npatch that checks that netlink messages actually came from the kernel, a\nbackported security patch for the getgroups list vulnerability, and patches\nfor the various bug fixes.\n\n[Update 2003-11-13]: The packages for Red Hat Linux 9 have been updated\nfor compatibility with kernels not provided by Red Hat.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2003:325",
        "url": "https://access.redhat.com/errata/RHSA-2003:325"
      },
      {
        "category": "external",
        "summary": "54697",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=54697"
      },
      {
        "category": "external",
        "summary": "83973",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=83973"
      },
      {
        "category": "external",
        "summary": "85994",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=85994"
      },
      {
        "category": "external",
        "summary": "86032",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=86032"
      },
      {
        "category": "external",
        "summary": "88409",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=88409"
      },
      {
        "category": "external",
        "summary": "88456",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=88456"
      },
      {
        "category": "external",
        "summary": "88978",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=88978"
      },
      {
        "category": "external",
        "summary": "89448",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=89448"
      },
      {
        "category": "external",
        "summary": "90002",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=90002"
      },
      {
        "category": "external",
        "summary": "90036",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=90036"
      },
      {
        "category": "external",
        "summary": "90077",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=90077"
      },
      {
        "category": "external",
        "summary": "90301",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=90301"
      },
      {
        "category": "external",
        "summary": "90987",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=90987"
      },
      {
        "category": "external",
        "summary": "91567",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=91567"
      },
      {
        "category": "external",
        "summary": "97814",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=97814"
      },
      {
        "category": "external",
        "summary": "97828",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=97828"
      },
      {
        "category": "external",
        "summary": "98966",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=98966"
      },
      {
        "category": "external",
        "summary": "101261",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=101261"
      },
      {
        "category": "external",
        "summary": "101691",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=101691"
      },
      {
        "category": "external",
        "summary": "102709",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=102709"
      },
      {
        "category": "external",
        "summary": "103727",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=103727"
      },
      {
        "category": "external",
        "summary": "105348",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=105348"
      },
      {
        "category": "external",
        "summary": "107846",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=107846"
      },
      {
        "category": "external",
        "summary": "108634",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=108634"
      },
      {
        "category": "external",
        "summary": "109904",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=109904"
      },
      {
        "category": "external",
        "summary": "109918",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=109918"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_325.json"
      }
    ],
    "title": "Red Hat Security Advisory: : Updated glibc packages provide security and bug fixes",
    "tracking": {
      "current_release_date": "2024-11-21T22:53:32+00:00",
      "generator": {
        "date": "2024-11-21T22:53:32+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2003:325",
      "initial_release_date": "2003-11-12T16:19:00+00:00",
      "revision_history": [
        {
          "date": "2003-11-12T16:19:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2003-11-12T00:00:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-21T22:53:32+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Linux 7.1",
                "product": {
                  "name": "Red Hat Linux 7.1",
                  "product_id": "Red Hat Linux 7.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:linux:7.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Linux 7.2",
                "product": {
                  "name": "Red Hat Linux 7.2",
                  "product_id": "Red Hat Linux 7.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:linux:7.2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Linux 7.3",
                "product": {
                  "name": "Red Hat Linux 7.3",
                  "product_id": "Red Hat Linux 7.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:linux:7.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Linux 8.0",
                "product": {
                  "name": "Red Hat Linux 8.0",
                  "product_id": "Red Hat Linux 8.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:linux:8.0"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Linux 9",
                "product": {
                  "name": "Red Hat Linux 9",
                  "product_id": "Red Hat Linux 9",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:linux:9"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Linux"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2003-0689",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1617066"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The getgrouplist function in GNU libc (glibc) 2.2.4 and earlier allows attackers to cause a denial of service (segmentation fault) and execute arbitrary code when a user is a member of a large number of groups, which can cause a buffer overflow.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat Linux 7.1",
          "Red Hat Linux 7.2",
          "Red Hat Linux 7.3",
          "Red Hat Linux 8.0",
          "Red Hat Linux 9"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2003-0689"
        },
        {
          "category": "external",
          "summary": "RHBZ#1617066",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617066"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0689",
          "url": "https://www.cve.org/CVERecord?id=CVE-2003-0689"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0689",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0689"
        }
      ],
      "release_date": "2003-04-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2003-11-12T16:19:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run the following\ncommand at a shell prompt:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade.  On the i686\narchitecture, *.i686.rpm packages should be installed where available\nrather than *.i386.rpm.\n\nIf you are unsure which architecture you are on, run the following\ncommand at a shell prompt:\n\nrpm -q --qf \u0027%{arch}\\n\u0027 glibc\n\nOnly those RPMs which are currently installed will be updated.  Those RPMs\nwhich are not installed but included in the list will not be updated.\nNote that you can also use wildcards (*.rpm) if your current directory\nonly contains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network.  Many\npeople find this an easier way to apply updates.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate\nErrors, you need to install a version of the up2date client with an updated\ncertificate.  The latest version of up2date is available from the Red Hat\nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
          "product_ids": [
            "Red Hat Linux 7.1",
            "Red Hat Linux 7.2",
            "Red Hat Linux 7.3",
            "Red Hat Linux 8.0",
            "Red Hat Linux 9"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2003:325"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "security flaw"
    },
    {
      "cve": "CVE-2003-0859",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1617097"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The getifaddrs function in GNU libc (glibc) 2.2.4 and earlier allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "security flaw",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat Linux 7.1",
          "Red Hat Linux 7.2",
          "Red Hat Linux 7.3",
          "Red Hat Linux 8.0",
          "Red Hat Linux 9"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2003-0859"
        },
        {
          "category": "external",
          "summary": "RHBZ#1617097",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617097"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0859",
          "url": "https://www.cve.org/CVERecord?id=CVE-2003-0859"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0859",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0859"
        }
      ],
      "release_date": "2003-11-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2003-11-12T16:19:00+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run the following\ncommand at a shell prompt:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade.  On the i686\narchitecture, *.i686.rpm packages should be installed where available\nrather than *.i386.rpm.\n\nIf you are unsure which architecture you are on, run the following\ncommand at a shell prompt:\n\nrpm -q --qf \u0027%{arch}\\n\u0027 glibc\n\nOnly those RPMs which are currently installed will be updated.  Those RPMs\nwhich are not installed but included in the list will not be updated.\nNote that you can also use wildcards (*.rpm) if your current directory\nonly contains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network.  Many\npeople find this an easier way to apply updates.  To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL Certificate\nErrors, you need to install a version of the up2date client with an updated\ncertificate.  The latest version of up2date is available from the Red Hat\nFTP site and may also be downloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt",
          "product_ids": [
            "Red Hat Linux 7.1",
            "Red Hat Linux 7.2",
            "Red Hat Linux 7.3",
            "Red Hat Linux 8.0",
            "Red Hat Linux 9"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2003:325"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "security flaw"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.