Security update for package glibc-devel
Knowledgebase
(Last modified: 30APR2003)
solutions Security update for package glibc-devel SuSE Linux Maintenance Web (18627c25ab6183d27ac57ddfea6f44ef)
SuSE eMail Server III
SuSE Firewall Adminhost VPN
SuSE Linux Admin-CD for Firewall
SuSE Firewall on CD 2 - VPN
SuSE Firewall on CD 2
SuSE Linux Connectivity Server
SuSE Linux Enterprise Server 7 for IA32
SuSE Linux Enterprise Server 7 for IA64
SuSE Linux Enterprise Server 7 for PowerPC
SuSE Linux Enterprise Server 7 for S/390 and zSeries
SuSE Linux Enterprise Server 7 for IBM zSeries
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM S/390 and IBM zSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Office Server
SuSE Linux Enterprise Server 8 for IPF
Package: glibc-devel
Release: 20030430
Obsoletes: none
xdrmem_getbytes()
- function that is part of the RPC
(Remote Procedure Call) subsystem in the glibc
. The resulting vulnerability may allow a remote attacker to execute arbitrary commands with the privileges of the user running the RPC
application.The flaw was discovered by researchers at eEye Digital Security. It is present in many implementations of the
RPC
protocol. The routine in question may be used by many applications using the RPC
system for data exchange over the network.Please note that the update for the
glibc-devel
patch does not have any immediate effect on running applications. The package glibc
contains the shared libraries that are linked to a dynamically linked binary each time the binary is started. The glibc-devel
package contains the static libraries for static linking. If you are using self-compiled statically linking binaries that make use of the RPC
subsystem of the glibc
, you should consider recompiling your applications.Please also have a look at the corresponding
glibc
patch:"" (/en/psdb/html/1ee50e40ff68329a41435819a916beed.html)
rpm -Fvh glibc-devel.rpm
Download Source Packages
Download the source code of the patches for maintained products.
Disclaimer
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.