Due to the recent GHOST vulnerability I was trying to upgrade the glibc version on our RHEL4.
The command I tried using was:
rpm -Uvh glibc-2.3.4-2.57.x86_64.rpm
Result was:
[root@rhel4-test ~]# rpm -Uvh glibc-2.3.4-2.57.i686.rpm
warning: glibc-2.3.4-2.57.i686.rpm: V3 DSA signature: NOKEY, key ID db42a60e
Preparing... ########################################### [100%]
package glibc-2.3.4-2.57 is already installed
The changelog on the RedHat support site seems pretty old although the version matches.
Has anyone managed to upgrade RHEL4 against GHOST (CVE-2015-0235) vulnerability?
RHEL 4 is in what Red Hat calls Extended Life Phase.
You can buy an Extended Life Cycle Support (ELS) subscription add-on for extended support.
If you have an ELS subscription so there is an update available as RHSA-2015:0101-1.
Your RHEL 4 system needs to subscribed to the correct channels in the RHN portal or with your Satellite server and then you run
up2date -u glibc
.Sasha has it almost right, and since I can't comment I'll post this as a standalone answer.
Ignoring dependency errors is a Very Bad Idea™. It's also unnecessary in this case since there's an updated version of nscd to go along with glibc.
The patched glibc packages are indeed available from Oracle, and I've confirmed that installing them patches the GHOST vulnerability. I suggest downloading all packages related to the patched glibc, then upgrading only ones that are already installed on your system with RPM freshen.
For 32 bit:
For 64 bit:
Afterwards, restart any running services that use glibc. You can get a list of these by running
lsof | grep libc | awk '{print $1}' | sort | uniq
. Depending on your situation, it's probably easier to simply restart the whole server.If you do not have RHEL subscription, Oracle was kind enough to release updated packages for your old RH4 box.
For both (i386 and X86_64) systems do:
For i386 system do (Note, I had to replace http with h**p to avoid spam filters here.) :
For X86_64 system do:
For all systems:
If you get an error about nscd depending on glibc, it is is OK to do:
Remember to restart all network aware services after the update. If you are unsure which services, it might not hurt just to restart the server.
After long discussions with RedHat I finally got the right files:
https://access.redhat.com/downloads/content/rhel---4/i386/2996/glibc/2.3.4-2.57.el4.2/i386/db42a60e/package
https://access.redhat.com/downloads/content/rhel---4/i386/2996/glibc-common/2.3.4-2.57.el4.2/i386/db42a60e/package
https://access.redhat.com/downloads/content/rhel---4/i386/2996/glibc-devel/2.3.4-2.57.el4.2/i386/db42a60e/package
https://access.redhat.com/downloads/content/rhel---4/i386/2996/glibc-headers/2.3.4-2.57.el4.2/i386/db42a60e/package
https://access.redhat.com/downloads/content/rhel---4/i386/2996/glibc-profile/2.3.4-2.57.el4.2/i386/db42a60e/package
https://access.redhat.com/downloads/content/rhel---4/i386/2996/glibc-utils/2.3.4-2.57.el4.2/i386/db42a60e/package
Just remember that downloading of these packages requires ELS.
Thank you all!
There is a patch, the RPM should be
glibc-2.3.4-2.57.el4.2.i686.rpm
.See: https://rhn.redhat.com/errata/RHSA-2015-0101.html
I have found in the past there have been viable options for building RHEL4 packages using the source found in Oracle Linux releases. https://oss.oracle.com/el4/SRPMS-updates/?C=M;O=D Just in case you can't make RHN work. You may have to wait a little while (couple of days) for a new src.rpm to show up.
I have mirrored RPMs at http://users.axess.com/rickm/glibc for el4.
Note: I am just mirroring them for someone in Brazil. The full source and spec file is available if you don't trust them.
Tested so Far on Centos 4.6 and 4.9
Rebooted cleanly and reported as not vulnerable.
Most servers I have run across aren't actually running nscd.
ps ax | grep nscd
Or chkconfig --list nscd
If both of those show that it isn't running it is safe to do a yum remove nscd (and nss_ldap) and then rpm -Uv glibc-*
I'm just a mirror, I did not create the RPMs.
Edit: I just looked and Oracle Linux has indeed updated their repo today. Better off to use theirs instead. See the above post on where to get it.
Regards,
Rick