---

Security: new libc5 packages available for Red Hat Linux


-----BEGIN PGP SIGNED MESSAGE-----

A buffer overflow has been identified in all versions of the libc 5 packages
shipped with Red Hat Linux. The most affected systems are those that are
libc 5 based (Red Hat Linux 4.2 and older). Only Intel and Sparc
architectures are affected.

The Red Hat Linux 5.x releases are glibc (libc 6) based, and Red Hat does
not ship any binaries linked against libc 5 that might be used for
compromising the system's security. However, Red Hat Linux 5.x releases do
include for backwards compatibility a package containg a vulnerable library.

Users of Red Hat Linux are recommended to upgrade to the new packages
available under updates directory on our ftp site:

Red Hat Linux 4.2:
==================

i386:
rpm -Uvh ftp://updates.redhat.com/4.2/i386/libc-5.3.12-18.4.i386.rpm
rpm -Uvh ftp://updates.redhat.com/4.2/i386/libc-debug-5.3.12-18.4.i386.rpm
rpm -Uvh ftp://updates.redhat.com/4.2/i386/libc-devel-5.3.12-18.4.i386.rpm
rpm -Uvh ftp://updates.redhat.com/4.2/i386/libc-profile-5.3.12-18.4.i386.rpm
rpm -Uvh ftp://updates.redhat.com/4.2/i386/libc-static-5.3.12-18.4.i386.rpm

sparc:
rpm -Uvh ftp://updates.redhat.com/4.2/sparc/libc-5.3.12-18.4.sparc.rpm
rpm -Uvh ftp://updates.redhat.com/4.2/sparc/libc-debug-5.3.12-18.4.sparc.rpm
rpm -Uvh ftp://updates.redhat.com/4.2/sparc/libc-devel-5.3.12-18.4.sparc.rpm
rpm -Uvh ftp://updates.redhat.com/4.2/sparc/libc-profile-5.3.12-18.4.sparc.rpm
rpm -Uvh ftp://updates.redhat.com/4.2/sparc/libc-static-5.3.12-18.4.sparc.rpm

Source rpm:
rpm -Uvh ftp://updates.redhat.com/4.2/SRPMS/libc-5.3.12-18.4.src.rpm


Red Hat Linux 5.0, 5.1 and 5.2:
===============================

i386:
rpm -Uvh ftp://updates.redhat.com/5.2/i386/libc-5.3.12-28.i386.rpm

Source rpm:
rpm -Uvh ftp://updates.redhat.com/5.2/SRPMS/libc-5.3.12-28.src.rpm


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNkt8xfGvxKXU9NkBAQEBuAP8DosSXiiNA5Yi95FpbPtxgBbtzUDHYtfE
8K3mRN2gyXY1LRshUSL1NW8Hxy16+8Y+kKHsBXH9sf4aNqwiEYzV5w+ZjOVIIEVb
xEQOEFMOg6Apni5Zzdct5J4RQuFhH59CCsroacfOVtN0CeqBSKQUenDAJD5F6uod
63xM/eDSqmY=
=WVg+
-----END PGP SIGNATURE-----

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis