Login
Newsletter
Werbung

Sicherheit: Denial of Service in zlib
Aktuelle Meldungen Distributionen
Name: Denial of Service in zlib
ID: MDKSA-2005:124
Distribution: Mandriva
Plattformen: Mandriva 10.0, Mandriva 10.1, Mandriva Corporate 3.0, Mandriva 10.2, Mandriva Multi Network Firewall 2.0
Datum: Mo, 25. Juli 2005, 13:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1849
Applikationen: zlib

Originalnachricht

This is a multi-part message in MIME format...

------------=_1122076146-740-5307

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Update Advisory
_______________________________________________________________________

Package name: zlib
Advisory ID: MDKSA-2005:124
Date: July 22nd, 2005

Affected versions: 10.0, 10.1, 10.2, Corporate 3.0,
Multi Network Firewall 2.0
______________________________________________________________________

Problem Description:

A previous zlib update (MDKSA-2005:112; CAN-2005-2096) fixed an overflow
flaw in the zlib program. While that update did indeed fix the reported
overflow issue, Markus Oberhumber discovered additional ways that a
specially-crafted compressed stream could trigger an overflow. An
attacker could create such a stream that would cause a linked
application to crash if opened by a user.

The updated packages are provided to protect against this flaw. The
Corporate Server 2.1 product is not affected by this vulnerability.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849
______________________________________________________________________

Updated Packages:

Mandrakelinux 10.0:
860987335903c382c12e42448367676f 10.0/RPMS/zlib1-1.2.1-2.3.100mdk.i586.rpm
e047a26f46031a57f896a1d36ccc52c3
10.0/RPMS/zlib1-devel-1.2.1-2.3.100mdk.i586.rpm
72ea4005316839b3c31b90d524c52d42 10.0/SRPMS/zlib-1.2.1-2.3.100mdk.src.rpm

Mandrakelinux 10.0/AMD64:
e6a94df40bc740d725731036e7f3db96
amd64/10.0/RPMS/zlib1-1.2.1-2.3.100mdk.amd64.rpm
890f9d6039a95f82365a7cb55e9017fb
amd64/10.0/RPMS/zlib1-devel-1.2.1-2.3.100mdk.amd64.rpm
72ea4005316839b3c31b90d524c52d42
amd64/10.0/SRPMS/zlib-1.2.1-2.3.100mdk.src.rpm

Mandrakelinux 10.1:
58c3324f33d5586d1bcdde0aca4e5a79 10.1/RPMS/zlib1-1.2.1.1-3.2.101mdk.i586.rpm
c0ccb2820937a05d8cc608701150f012
10.1/RPMS/zlib1-devel-1.2.1.1-3.2.101mdk.i586.rpm
17ad74eeed07fab9c8829dd546be6890 10.1/SRPMS/zlib-1.2.1.1-3.2.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:
87e7046c0c876da2c94590ad6c98dafe
x86_64/10.1/RPMS/zlib1-1.2.1.1-3.2.101mdk.x86_64.rpm
f90e56e2ab04468abac0c08849a5260a
x86_64/10.1/RPMS/zlib1-devel-1.2.1.1-3.2.101mdk.x86_64.rpm
17ad74eeed07fab9c8829dd546be6890
x86_64/10.1/SRPMS/zlib-1.2.1.1-3.2.101mdk.src.rpm

Mandrakelinux 10.2:
d30d7cfb002353a63f89ba382062a78e 10.2/RPMS/zlib1-1.2.2.2-2.2.102mdk.i586.rpm
5c4a526d818a326fafd6c9e9672b3447
10.2/RPMS/zlib1-devel-1.2.2.2-2.2.102mdk.i586.rpm
543c843e6691904415c4c8bc45affe7c 10.2/SRPMS/zlib-1.2.2.2-2.2.102mdk.src.rpm

Mandrakelinux 10.2/X86_64:
c7c5d4fbeb2db2ffa27e6123958280a7
x86_64/10.2/RPMS/zlib1-1.2.2.2-2.2.102mdk.x86_64.rpm
dbc5bbd0220041e3594939e963bfb5da
x86_64/10.2/RPMS/zlib1-devel-1.2.2.2-2.2.102mdk.x86_64.rpm
543c843e6691904415c4c8bc45affe7c
x86_64/10.2/SRPMS/zlib-1.2.2.2-2.2.102mdk.src.rpm

Multi Network Firewall 2.0:
631b3c1e87bbde27e99673d30c1e91c1 mnf/2.0/RPMS/zlib1-1.2.1-2.3.M20mdk.i586.rpm
c3077bbfdaeb2c6fc1e5aed4f6b0e65b mnf/2.0/SRPMS/zlib-1.2.1-2.3.M20mdk.src.rpm

Corporate 3.0:
2e66862f24760823bdaa26c20fbc7606
corporate/3.0/RPMS/zlib1-1.2.1-2.3.C30mdk.i586.rpm
d9cab4b4ab9a04eeee1b38ac7c3e5e5a
corporate/3.0/RPMS/zlib1-devel-1.2.1-2.3.C30mdk.i586.rpm
ae75fabf010504e1b0f84f79e50c5753
corporate/3.0/SRPMS/zlib-1.2.1-2.3.C30mdk.src.rpm

Corporate 3.0/X86_64:
92ef33342acbfa125fb45e84a591cf3f
x86_64/corporate/3.0/RPMS/zlib1-1.2.1-2.3.C30mdk.x86_64.rpm
b884c537207635c8d1ca5ac9bcfed24a
x86_64/corporate/3.0/RPMS/zlib1-devel-1.2.1-2.3.C30mdk.x86_64.rpm
ae75fabf010504e1b0f84f79e50c5753
x86_64/corporate/3.0/SRPMS/zlib-1.2.1-2.3.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFC4XyumqjQ0CJFipgRAmhcAJ0dskt+ZAg53ZAU4tBFwZyzLfAaUACguxr1
XyvQZo/trBQf15WO1LATnmk=
=BJR3
-----END PGP SIGNATURE-----


------------=_1122076146-740-5307
Content-Disposition: inline; filename="message.footer"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________



------------=_1122076146-740-5307--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung