[CLA-2003:619] Conectiva Security Announcement - zlib

From: Conectiva Updates (secureat_private)
Date: Mon Apr 07 2003 - 13:13:52 PDT

  • Next message: Roman Drahtmueller: "SuSE Security Announcement: samba (SuSE-SA:2003:025)"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - --------------------------------------------------------------------------
    CONECTIVA LINUX SECURITY ANNOUNCEMENT 
    - --------------------------------------------------------------------------
    
    PACKAGE   : zlib
    SUMMARY   : gzprintf() buffer overflow
    DATE      : 2003-04-07 17:10:00
    ID        : CLA-2003:619
    RELEVANT
    RELEASES  : 6.0, 7.0, 8
    
    - -------------------------------------------------------------------------
    
    DESCRIPTION
     "zlib"[1] is a compression library used by several programs.
     
     Richard Kettlewell discovered[1] a buffer overflow vulnerability[2]
     in the gzprintf() function provided by zlib. If a program passes
     unsafe data to this function (e.g. data from remote images or network
     traffic), it is possible for a remote attacker to execute arbitrary
     code or to cause a denial of service in such programs.
     
     Although hundreds of programs are linked against zlib in Conectiva
     Linux, the vulnerable function, gzprintf(), is rarely used, which
     lessens the impact of this vulnerability.
     
     The Common Vulnerabilities and Exposures (CVE) project has assigned
     the name CAN-2003-0107 to this issue.
    
    
    SOLUTION
     All users should upgrade.
     
     Please note that it is necessary to restart services which use the
     library so that the new, fixed, version is used. A list of such
     applications can be obtained after the upgrade with the following
     command:
     
         lsof | grep libz
     
     The first column will contain the name of the application that needs
     to be restarted. If there is any doubt about which application has to
     be restarted or how to do it, we recommend a system reboot.
     
     
     REFERENCES:
     1.http://www.gzip.org/zlib/
     2.http://online.securityfocus.com/archive/1/312869
     3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0107
    
    
    UPDATED PACKAGES
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/zlib-1.1.3-15U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/zlib-devel-1.1.3-15U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/zlib-devel-static-1.1.3-15U60_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/zlib-1.1.3-15U60_2cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/zlib-1.1.3-15U70_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/zlib-devel-1.1.3-15U70_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/zlib-devel-static-1.1.3-15U70_2cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/zlib-1.1.3-15U70_2cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/8/RPMS/zlib-1.1.3-16U80_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/8/RPMS/zlib-devel-1.1.3-16U80_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/8/RPMS/zlib-devel-static-1.1.3-16U80_1cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/8/SRPMS/zlib-1.1.3-16U80_1cl.src.rpm
    
    
    ADDITIONAL INSTRUCTIONS
     The apt tool can be used to perform RPM packages upgrades:
    
     - run:                 apt-get update
     - after that, execute: apt-get upgrade
    
     Detailed instructions reagarding the use of apt and upgrade examples 
     can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en
    
    - -------------------------------------------------------------------------
    All packages are signed with Conectiva's GPG key. The key and instructions
    on how to import it can be found at 
    http://distro.conectiva.com.br/seguranca/chave/?idioma=en
    Instructions on how to check the signatures of the RPM packages can be
    found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
    
    - -------------------------------------------------------------------------
    All our advisories and generic update instructions can be viewed at
    http://distro.conectiva.com.br/atualizacoes/?idioma=en
    
    - -------------------------------------------------------------------------
    Copyright 2003 (c) Conectiva Inc.
    http://www.conectiva.com
    
    - -------------------------------------------------------------------------
    subscribe: conectiva-updates-subscribeat_private
    unsubscribe: conectiva-updates-unsubscribeat_private
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.6 (GNU/Linux)
    Comment: For info see http://www.gnupg.org
    
    iD8DBQE+kdv/42jd0JmAcZARAhOVAKC5MvGzhE2yvR4G2QK4eyZsJSJGYACeIkdo
    t8AHv3DpFy01QyjOSowBe3g=
    =1raK
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Mon Apr 07 2003 - 13:41:25 PDT