Security Bugfix for libz
(Last modified: 11MAR2002)
solutions Security Bugfix for libz SuSE Linux Maintenance Web (a65d5b3d86cfc33af5b71ce3e5167c33)
SuSE Linux Admin-CD for Firewall
SuSE eMail Server III
SuSE Linux Enterprise Server 7 for PowerPC
SuSE Linux Enterprise Server 7 for IA32
SuSE Linux Enterprise Server 7 for IA64
SuSE Linux Enterprise Server 7 for S/390 and zSeries
SuSE Linux Enterprise Server for S/390
SuSE Firewall Adminhost VPN
SuSE Linux Connectivity Server
free()function. If the data processed by the compression library is provided from untrusted sources, it may be possible for an attacker to spoil the process using the zlib routines. The attack scenario includes a denial of service attack and memory/data disclosure, but it may also be possible to insert arbitrary code into the running program and to execute this code. This patch fixes the known problems in the zlib. Since the compression library is being used in many hundred packages, it should be made sure that all of these packages really use the fixed version by restarting all processes. In doubt, please reboot your system.
rpm -Uvh zlib.rpm
It is necessary to restart all processes using the compression library by either going to single user mode and back to your default runlevel, or to reboot your system.
Download Source Packages
Download the source code of the patches for maintained products.
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.