* GLSA: zlib (200303-25)
@ 2003-03-28 10:51 Daniel Ahlberg
0 siblings, 0 replies; only message in thread
From: Daniel Ahlberg @ 2003-03-28 10:51 UTC (permalink / raw
To: gentoo-announce
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-25
- - ---------------------------------------------------------------------
PACKAGE : zlib
SUMMARY : buffer overrun
DATE : 2003-03-28 10:50 UTC
EXPLOIT : remote
VERSIONS AFFECTED : <1.1.4-r1
FIXED VERSION : >=1.1.4-r1
CVE : CAN-2003-0107
- - ---------------------------------------------------------------------
- From advisory:
"zlib contains a function called gzprintf(). This is similar in
behaviour to fprintf() except that by default, this function will
smash the stack if called with arguments that expand to more than
Z_PRINTF_BUFSIZE (=4096 by default) bytes."
Read the full advisory at
http://www.securityfocus.com/archive/1/312869/2003-02-18/2003-02-24/0
SOLUTION
It is recommended that all Gentoo Linux users who are running
sys-libs/zlib upgrade to zlib-1.1.4-r1 as follows:
emerge sync
emerge zlib
emerge clean
- - ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at http://cvs.gentoo.org/~aliz
- - ---------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQE+hCkVfT7nyhUpoZMRAv/oAKCvQvr9WZOBm6O4Z+rWXArdWB2JZACfU9gT
jJ0a21t+xwPVPf8Lb2ObEsA=
=1ZIH
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2003-03-28 11:09 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2003-03-28 10:51 GLSA: zlib (200303-25) Daniel Ahlberg
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox