blob: 8cb9ee8e4692fb1f9f4986eaa28837e6d901c6d3 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200508-01">
<title>Compress::Zlib: Buffer overflow</title>
Compress::Zlib is vulnerable to a buffer overflow which could potentially
lead to execution of arbitrary code.
<product type="ebuild">Compress-Zlib</product>
<announced>August 01, 2005</announced>
<revised>May 28, 2009: 02</revised>
<package name="perl-core/Compress-Zlib" auto="yes" arch="*">
<unaffected range="ge">1.35</unaffected>
<vulnerable range="lt">1.35</vulnerable>
The Compress::Zlib is a Perl module which provides an interface to
the zlib compression library.
Compress::Zlib 1.34 contains a local vulnerable version of zlib,
which may lead to a buffer overflow.
<impact type="high">
By creating a specially crafted compressed data stream, attackers
can overwrite data structures for applications that use Compress::Zlib,
resulting in a Denial of Service and potentially arbitrary code
There is no known workaround at this time.
All Compress::Zlib users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=perl-core/Compress-Zlib-1.35&quot;</code>
<uri link="/security/en/glsa/glsa-200507-19.xml">GLSA 200507-19</uri>
<uri link="/security/en/glsa/glsa-200507-05.xml">GLSA 200507-05</uri>
<uri link="">CAN-2005-1849</uri>
<uri link="">CAN-2005-2096</uri>
<metadata tag="requester" timestamp="Thu, 28 Jul 2005 11:43:56 +0000">
<metadata tag="submitter" timestamp="Fri, 29 Jul 2005 23:24:17 +0000">
<metadata tag="bugReady" timestamp="Mon, 01 Aug 2005 05:55:33 +0000">