SuSE: 2004-029: zlib Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SUSE Security Announcement
Package: zlib
Announcement-ID: SUSE-SA:2004:029
Date: Thursday, Sep 2nd 2004 17:30:00 MEST
Affected products: 9.1
SUSE Linux Enterprise Server 9
Vulnerability Type: denial of service
Severity (1-10): 3-5
SUSE default package: yes
Cross References: CAN-2004-0797
VU#238678
Content of this advisory:
1) security vulnerability resolved:
- denial of service condition in zlib
2) solution/workaround
3) special instructions and notes
4) package location and checksums
5) pending vulnerabilities, solutions, workarounds:
- gaim
- opera
- imlib, imlib2
6) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion
zlib is a widely used data compression library. Programs linked against it
include most desktop applications as well as servers such as Apache and
OpenSSH.
The 'inflate' function of zlib handles certain input data
incorrectly which could lead to a denial of service condition for
programs using it with untrusted data. Whether the vulnerability
can be exploided locally or remotely depends on the application
using it.
zlib versions older than version 1.2 are not affected.
2) solution/workaround
There is no known workaround.
3) special instructions and notes
After applying the update all programs linked against libz must be
restarted.
4) package location and checksums
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
x86 Platform:
SUSE Linux 9.1:
831b925bd07550e53fcef3657416675d
10f7fb0af45b2c0fd436ddc8a2876697
patch rpm(s):
4a0b7a87fc8ed9129b6d940d8b577aa7
75b7929b89794b07ae96ce6bb833fcb0
source rpm(s):
1cb7920050dc98a04377837f626ebd33
x86-64 Platform:
SUSE Linux 9.1:
df1d74ebec5f74da7244ba8fff23feb0
284ab472d375c567557a9256ca55cdc3
patch rpm(s):
7b49fd8bc2c06becd0aec7db62e4cd3d
a62b558fd4f683eddce9615090ef01b4
source rpm(s):
1ab725bb307b26a928edadfdb2d57cbc
______________________________________________________________________________
5) Pending vulnerabilities in SUSE Distributions and Workarounds:
- gaim
Various buffer overflow conditions have been found in the gaim
instant messenger. The MSN protocol parsing has already been fixed
with the packages announced in the SUSE Security Announcement
SUSE-SA:2004:025. The packages which fix the other pending
bugs in gaim will be available on our FTP servers soon.
- opera
The web-browser opera is affected by several security bugs.
New packages will soon be available on our FTP servers.
- imlib, imlib2
Buffer overflows in the BMP image loader of imlib and imlib2 have been
discovered. New packages will be available on our FTP servers soon.
______________________________________________________________________________
6) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SUSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References