lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <E1Dw6e6-0008Ek-GW@mercury.mandriva.com> Date: Sat Jul 23 00:09:41 2005 From: security at mandriva.com (Mandriva Security Team) Subject: MDKSA-2005:124 - Updated zlib packages fix vulnerability -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Update Advisory _______________________________________________________________________ Package name: zlib Advisory ID: MDKSA-2005:124 Date: July 22nd, 2005 Affected versions: 10.0, 10.1, 10.2, Corporate 3.0, Multi Network Firewall 2.0 ______________________________________________________________________ Problem Description: A previous zlib update (MDKSA-2005:112; CAN-2005-2096) fixed an overflow flaw in the zlib program. While that update did indeed fix the reported overflow issue, Markus Oberhumber discovered additional ways that a specially-crafted compressed stream could trigger an overflow. An attacker could create such a stream that would cause a linked application to crash if opened by a user. The updated packages are provided to protect against this flaw. The Corporate Server 2.1 product is not affected by this vulnerability. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849 ______________________________________________________________________ Updated Packages: Mandrakelinux 10.0: 860987335903c382c12e42448367676f 10.0/RPMS/zlib1-1.2.1-2.3.100mdk.i586.rpm e047a26f46031a57f896a1d36ccc52c3 10.0/RPMS/zlib1-devel-1.2.1-2.3.100mdk.i586.rpm 72ea4005316839b3c31b90d524c52d42 10.0/SRPMS/zlib-1.2.1-2.3.100mdk.src.rpm Mandrakelinux 10.0/AMD64: e6a94df40bc740d725731036e7f3db96 amd64/10.0/RPMS/zlib1-1.2.1-2.3.100mdk.amd64.rpm 890f9d6039a95f82365a7cb55e9017fb amd64/10.0/RPMS/zlib1-devel-1.2.1-2.3.100mdk.amd64.rpm 72ea4005316839b3c31b90d524c52d42 amd64/10.0/SRPMS/zlib-1.2.1-2.3.100mdk.src.rpm Mandrakelinux 10.1: 58c3324f33d5586d1bcdde0aca4e5a79 10.1/RPMS/zlib1-1.2.1.1-3.2.101mdk.i586.rpm c0ccb2820937a05d8cc608701150f012 10.1/RPMS/zlib1-devel-1.2.1.1-3.2.101mdk.i586.rpm 17ad74eeed07fab9c8829dd546be6890 10.1/SRPMS/zlib-1.2.1.1-3.2.101mdk.src.rpm Mandrakelinux 10.1/X86_64: 87e7046c0c876da2c94590ad6c98dafe x86_64/10.1/RPMS/zlib1-1.2.1.1-3.2.101mdk.x86_64.rpm f90e56e2ab04468abac0c08849a5260a x86_64/10.1/RPMS/zlib1-devel-1.2.1.1-3.2.101mdk.x86_64.rpm 17ad74eeed07fab9c8829dd546be6890 x86_64/10.1/SRPMS/zlib-1.2.1.1-3.2.101mdk.src.rpm Mandrakelinux 10.2: d30d7cfb002353a63f89ba382062a78e 10.2/RPMS/zlib1-1.2.2.2-2.2.102mdk.i586.rpm 5c4a526d818a326fafd6c9e9672b3447 10.2/RPMS/zlib1-devel-1.2.2.2-2.2.102mdk.i586.rpm 543c843e6691904415c4c8bc45affe7c 10.2/SRPMS/zlib-1.2.2.2-2.2.102mdk.src.rpm Mandrakelinux 10.2/X86_64: c7c5d4fbeb2db2ffa27e6123958280a7 x86_64/10.2/RPMS/zlib1-1.2.2.2-2.2.102mdk.x86_64.rpm dbc5bbd0220041e3594939e963bfb5da x86_64/10.2/RPMS/zlib1-devel-1.2.2.2-2.2.102mdk.x86_64.rpm 543c843e6691904415c4c8bc45affe7c x86_64/10.2/SRPMS/zlib-1.2.2.2-2.2.102mdk.src.rpm Multi Network Firewall 2.0: 631b3c1e87bbde27e99673d30c1e91c1 mnf/2.0/RPMS/zlib1-1.2.1-2.3.M20mdk.i586.rpm c3077bbfdaeb2c6fc1e5aed4f6b0e65b mnf/2.0/SRPMS/zlib-1.2.1-2.3.M20mdk.src.rpm Corporate 3.0: 2e66862f24760823bdaa26c20fbc7606 corporate/3.0/RPMS/zlib1-1.2.1-2.3.C30mdk.i586.rpm d9cab4b4ab9a04eeee1b38ac7c3e5e5a corporate/3.0/RPMS/zlib1-devel-1.2.1-2.3.C30mdk.i586.rpm ae75fabf010504e1b0f84f79e50c5753 corporate/3.0/SRPMS/zlib-1.2.1-2.3.C30mdk.src.rpm Corporate 3.0/X86_64: 92ef33342acbfa125fb45e84a591cf3f x86_64/corporate/3.0/RPMS/zlib1-1.2.1-2.3.C30mdk.x86_64.rpm b884c537207635c8d1ca5ac9bcfed24a x86_64/corporate/3.0/RPMS/zlib1-devel-1.2.1-2.3.C30mdk.x86_64.rpm ae75fabf010504e1b0f84f79e50c5753 x86_64/corporate/3.0/SRPMS/zlib-1.2.1-2.3.C30mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFC4XyumqjQ0CJFipgRAmhcAJ0dskt+ZAg53ZAU4tBFwZyzLfAaUACguxr1 XyvQZo/trBQf15WO1LATnmk= =BJR3 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists