Gentoo: zlib stack overflow vulnerability
Summary
- - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200303-25 - - ---------------------------------------------------------------------
- - ---------------------------------------------------------------------
- From advisory: "zlib contains a function called gzprintf(). This is similar in behaviour to fprintf() except that by default, this function will smash the stack if called with arguments that expand to more than Z_PRINTF_BUFSIZE (=4096 by default) bytes."
Read the full advisory at
SOLUTION
It is recommended that all Gentoo Linux users who are running sys-libs/zlib upgrade to zlib-1.1.4-r1 as follows:
emerge sync emerge zlib emerge clean
- - --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at - - ---------------------------------------------------------------------
1.1.4-r1
Resolution
References
Availability
Concerns
Background