On 3/11/02 at 10:42 PM, Manfred Schuler <[EMAIL PROTECTED]>
wrote:

> Today I received this security announcements.
> If you think, it is not necessary to forward this message
> to the list, please tell me.

Should we (as distribution creators) be sending out our own "Official
Vendor Security Alerts"?  Sounds logical to me...

> The zlib compression library is being used by many
> applications to provide data compression/decompression
> routines. An error in a decompression routine can corrupt
> the internal data structures of malloc by a double call to
> the free() function. If the data processed by the
> compression library is provided from an untrusted source,
> it may be possible for an attacker to interfere with the
> process using the zlib routines. The attack scenario
> includes a denial of service attack and memory/data
> disclosure, but it may also be possible to insert
> arbitrary code into the running program and to execute
> this code. This update fixes the known problems in the
> libz/zlib as a permanent fix. There exists no temporary
> workaround that can efficiently remedy the problem.

>     The following is a list of the packages in category 2):
>         gpg
>         rsync
>         cvs
>         rrdtool
>         freeamp
>         netscape
>         vnc
>         kernel

I've created Packages for rsync and vnc.  Both probably should be
updated.  The kernel should be updated as well.

I don't remember creating a cvs.lrp but you never know... should
check.  Would this affect OpenSSL?

Also, are you all aware that there is a vulnerability in OpenSSH 3.0
and earlier?  Fix exists in OpenSSH 3.1...
--
David Douthitt
UNIX Systems Administrator
HP-UX, Unixware, Linux
[EMAIL PROTECTED]

_______________________________________________
Leaf-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-devel

Reply via email to