GLSA: zlib (200303-25)

From: Daniel Ahlberg (alizat_private)
Date: Fri Mar 28 2003 - 02:51:05 PST

  • Next message: Martin Schulze: "[SECURITY] [DSA 273-1] New krb4 packages fix authentication failure"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - ---------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200303-25
    - - ---------------------------------------------------------------------
    
              PACKAGE : zlib
              SUMMARY : buffer overrun
                 DATE : 2003-03-28 10:50 UTC
              EXPLOIT : remote
    VERSIONS AFFECTED : <1.1.4-r1
        FIXED VERSION : >=1.1.4-r1
                  CVE : CAN-2003-0107
    
    - - ---------------------------------------------------------------------
    
    - From advisory:
    "zlib contains a function called gzprintf().  This is similar in
    behaviour to fprintf() except that by default, this function will
    smash the stack if called with arguments that expand to more than
    Z_PRINTF_BUFSIZE (=4096 by default) bytes."
    
    Read the full advisory at
    http://www.securityfocus.com/archive/1/312869/2003-02-18/2003-02-24/0
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    sys-libs/zlib upgrade to zlib-1.1.4-r1 as follows:
    
    emerge sync
    emerge zlib
    emerge clean
    
    - - ---------------------------------------------------------------------
    alizat_private - GnuPG key is available at http://cvs.gentoo.org/~aliz
    - - ---------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.1 (GNU/Linux)
    
    iD8DBQE+hCkVfT7nyhUpoZMRAv/oAKCvQvr9WZOBm6O4Z+rWXArdWB2JZACfU9gT
    jJ0a21t+xwPVPf8Lb2ObEsA=
    =1ZIH
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Fri Mar 28 2003 - 10:33:39 PST