Security update for package glibc-devel
(Last modified: 30APR2003)
solutions Security update for package glibc-devel SuSE Linux Maintenance Web (18627c25ab6183d27ac57ddfea6f44ef)
SuSE eMail Server III
SuSE Firewall Adminhost VPN
SuSE Linux Admin-CD for Firewall
SuSE Firewall on CD 2 - VPN
SuSE Firewall on CD 2
SuSE Linux Connectivity Server
SuSE Linux Enterprise Server 7 for IA32
SuSE Linux Enterprise Server 7 for IA64
SuSE Linux Enterprise Server 7 for PowerPC
SuSE Linux Enterprise Server 7 for S/390 and zSeries
SuSE Linux Enterprise Server 7 for IBM zSeries
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM S/390 and IBM zSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Office Server
SuSE Linux Enterprise Server 8 for IPF
xdrmem_getbytes()- function that is part of the
RPC(Remote Procedure Call) subsystem in the
glibc. The resulting vulnerability may allow a remote attacker to execute arbitrary commands with the privileges of the user running the
The flaw was discovered by researchers at eEye Digital Security. It is present in many implementations of the
RPCprotocol. The routine in question may be used by many applications using the
RPCsystem for data exchange over the network.
Please note that the update for the
glibc-develpatch does not have any immediate effect on running applications. The package
glibccontains the shared libraries that are linked to a dynamically linked binary each time the binary is started. The
glibc-develpackage contains the static libraries for static linking. If you are using self-compiled statically linking binaries that make use of the
RPCsubsystem of the
glibc, you should consider recompiling your applications.
Please also have a look at the corresponding
rpm -Fvh glibc-devel.rpm
Download Source Packages
Download the source code of the patches for maintained products.
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.