Slackware: 'zlib' Data corruption vulnerability
Summary
Where Find New Packages
MD5 Signatures
Installation Instructions
Date: Mon, 11 Mar 2002 14:12:40 -0800 (PST) From: Slackware Security Team <security@slackware.com> To: slackware-security@slackware.com Subject: [slackware-security] zlib upgrade fixes vulnerability New zlib packages are available to fix a security problem which may impact programs that link with zlib. Here's the information from the Slackware 8.0 ChangeLog: ---------------------------- Mon Mar 11 13:32:40 PST 2002 patches/packages/zlib.tgz: Upgraded to zlib-1.1.4. This fixes a security problem which may introduce vulnerabilities into any program that links with zlib. Quoting the advisory on zlib.org: "Depending upon how and where the zlib routines are called from the given program, the resulting vulnerability may have one or more of the following impacts: denial of service, information leakage, or execution of arbitrary code." Sites are urged to upgrade the zlib package immediately. The complete advisory may be found here: zlib (* Security fix *) ---------------------------- WHERE TO FIND THE NEW PACKAGE: ------------------------------ Updated zlib package for Slackware 7.1: Updated zlib package for Slackware 8.0: Updated zlib package for Slackware -current: MD5 SIGNATURE: -------------- Here is the md5sum for the package: Slackware 7.1: 8371e3ea1d8d0f624edc43ede13e82dd zlib.tgz Slackware 8.0: 7e5187be97632b446c214cf62fc94fff zlib.tgz Slackware -current: 5d9968475642c822ae11cce8c5504ece zlib-1.1.4-i386-1.tgz INSTALLATION INSTRUCTIONS: -------------------------- As root, upgrade to the new zlib.tgz package: # upgradepkg zlib.tgz Afterwards, restart any running programs that link to libz.so. Remember, it's also a good idea to backup configuration files before upgrading packages. - Slackware Linux Security Team The Slackware Linux Project