Notified: March 05, 2002 Updated: March 06, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 25, 2002 Updated: March 25, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 23, 2002 Updated: March 11, 2002
Not Affected
Mac OS X and Mac OS X Server do not contain this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 11, 2002 Updated: March 14, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 23, 2002 Updated: March 11, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 11, 2002 Updated: April 03, 2002
Affected
Cisco Systems is addressing the vulnerability identified by VU#368819 across all affected products. Cisco has released an advisory: http://www.cisco.com/warp/public/707/zlib-double-free.shtml
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 23, 2002 Updated: October 17, 2002
Affected
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SECURITY BULLETIN REVISION: 1 SSRT0818U HP Tru64 UNIX V5.1A zlib Potential Security Vulnerability NOTICE: There are no restrictions for distribution of this Bulletin provided that it remains complete and intact. RELEASE DATE: October 2002 SEVERITY: High SOURCE: Compaq Computer Corporation, a wholly-owned subsidiary of Hewlett-Packard Company and Hewlett-Packard Company HP Services Software Security Response Team REFERENCE: CERT CA-2002-07 PROBLEM SUMMARY This bulletin will be posted to the support website within 24 hours of release to http://thenew.hp.com/country/us/eng/support.html Use the SEARCH IN feature box, enter SSRT0818U in the search window. SSRT0818U zlib (Severity - High) A potential security vulnerability has been discovered, where under certain circumstances, system integrity may be compromised. This may be in the form of improper file or privilege management. Compaq has corrected this potential vulnerability. VERSIONS IMPACTED: HP Tru64 UNIX 5.1A only NOT IMPACTED: HP-UX HP Tru64 UNIX V5.1, V5.0A, V4.0G, V4.0F HP NonStop Servers HP OpenVMS RESOLUTION The HP Tru64 UNIX fix is available in the mainstream release patch kit for HP Tru64 UNIX V5.1A PK3 (BL3). HP Tru64 UNIX 5.1A Kit Name: t64v51ab03as0003-20020827.tar Kit Location: ftp://ftp1.support.compaq.com/public/unix/v5.1a/ Information on how to verify MD5 and SHA1 checksums is available at: http://www.support.compaq.com/patches/whats-new.shtml After completing the update, HP and Compaq strongly recommend that you perform an immediate backup of the system disk so that any subsequent restore operations begin with updated software. Otherwise, the updated must be re-applied after a future restore operation. Also, if at some future time the system is upgraded to a later patch release or version release, reinstall the appropriate ERP. SUPPORT: For further information, contact HP Services. SUBSCRIBE: To subscribe to automatically receive future Security Advisories from the Software Security Response Team via electronic mail: http://www.support.compaq.com/patches/mailing-list.shtml REPORT: To report a potential security vulnerability with any HP or Compaq supported product, send email to: security-alert@hp.com HP and Compaq appreciate your cooperation and patience. As always, HP and Compaq urge you to periodically review your system management and security procedures. HP and Compaq will continue to review and enhance the security features of its products and work with our customers to maintain and improve the security and integrity of their systems. "HP and Compaq are broadly distributing this Security Bulletin in order to bring to the attention of users of the affected Compaq products the important security information contained in this Bulletin. HP and Compaq recommend that all users determine the applicability of this information to their individual situations and take appropriate action. Neither HP nor Compaq warrant that this information is necessarily accurate or complete for all user situations and, consequently, neither HP nor Compaq will be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin." ©Copyright 2002 Hewlett-Packard Company Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: PGP 7.0.4 iQA/AwUBPaycXDnTu2ckvbFuEQJiAwCg+IqvFGshPKuZFqsWcVPwtskYd1AAoIbx jg2EImUdurxdVHqXHP45uTup =IU0f -----END PGP SIGNATURE-----
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 11, 2002 Updated: March 14, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 18, 2002 Updated: June 14, 2002
Affected
Conectiva Linux supported versions (5.0, 5.1, 6.0, 7.0, ferramentas gráficas and ecoomerce) are affected by the zlib vulnerability. Updates will be sent to our security mailing lists and be available at our ftp site and mirrors. The updates will include a new version of zlib itself and also other packages which include their own version of zlib or are linked statically to the system-wide copy of zlib.
The vendor has not provided us with any further information regarding this vulnerability.
Conectiva has released Conectiva Linux Security Announcements CLSA-2002:469, CLSA-2002:492, and CLSA-2002:493 to address this vulnerability. For more information, please see http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000469 http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000492 http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000493
Notified: February 23, 2002 Updated: February 25, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 23, 2002 Updated: March 18, 2002
Affected
Users of Debian GNU/Linux 2.2 (potato) should upgrade to zlib version 1.1.3-5.1. More information is available at http://www.debian.org/security/2002/dsa-122. Note that a few packages which include private copies of zlib will also need to be upgraded--more information is available at the above link.
The vendor has not provided us with any further information regarding this vulnerability.
Debian has released Debian Security Advisory DSA-122-1 to address this issue; for more information, please see http://www.debian.org/security/2002/dsa-122
Notified: February 23, 2002 Updated: April 23, 2002
Affected
FreeBSD is not vulnerable, as the FreeBSD malloc implementation detects and complains about several programming errors including this kind of double free.
The vendor has not provided us with any further information regarding this vulnerability.
FreeBSD has released FreeBSD Security Advisory FreeBSD-SA-02:18 to address this issue. For more information, please see ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:18.zlib.asc ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:3A18.zlib.v1.1.asc ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:3A18.zlib.v1.2.asc
Notified: March 14, 2002 Updated: March 15, 2002
Not Affected
F-Secure SSH is not vulnerable to zlib double free bug. No version of F-Secure SSH software is vulnerable to the "Double Free Bug in zlib Compression Library" discussed in CERT Advisory CA-2002-07. All F-Secure SSH versions, both the old SSH1 and later SSH2 protocol clients and servers, close connection immediately with fatal cleanup call without any further calls to zlib when call to zlib's inflate() returns something else than Z_OK.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 23, 2002 Updated: March 08, 2002
Not Affected
Fujitsu's UXP/V operating system is not affected by the zlib vulnerability because it does not support zlib.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 11, 2002 Updated: March 12, 2002
Affected
EnGarde Secure Linux Community and Professional are both vulnerable to the zlib bugs. Guardian Digital addressed this vulnerability in ESA-20020311-008 which may be found at: http://www.linuxsecurity.com/advisories/other_advisory-1960.html EnGarde Secure Professional users may upgrade their systems using the Guardian Digital Secure Network.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 23, 2002 Updated: January 24, 2003
Affected
Some HP-UX software (for example, X and lbxproxy) is linked with the 1.0.8 version of zlib. This version came before the introduction of the reported double free problem and is not vulnerable. Other HP-UX software (for example, OpenSSH) is linked with the latest zlib (1.1.4) and is not vulnerable.
The vendor has not provided us with any further information regarding this vulnerability.
HP has published multiple HP Security Bulletins to address this issue: HPSBTL0204-037 Security vulnerability in audit subsystem HPSBTL0204-036 Security vulnerabilities in the kernel HPSBTL0204-030 Security vulnerability in zlib library HPSBTL0203-029 Security vulnurabilty in openssh-clients HPSBUX0211-0226 SSRT2146 Java Zlib compression libraries bug For further information, please visit http://itrc.hp.com and search for the appropriate reference number. Please note that registration may be required to access these documents.
Notified: February 23, 2002 Updated: June 25, 2002
Affected
IBM's AIX operating system, version 5.1, ships with open source-originated zlib that is used with the Red Hat Package Manager (rpm) to install applications that are included in the AIX-Linux Affinity Toolkit. zlib (libz.a) is a shared library in AIX. AIX 5.1 is presumed susceptible to the described vulnerability, though we have not demonstrated exploitability yet. AIX 4.3.x does not ship with zlib, but customers who install zlib and use it may be similarly vulnerable. The updated zlib package can be downloaded by directing your browser to: http://oss.software.ibm.com/developerworks/projects/aixtoolbox The updated rpm package can be downloaded from: ftp://ftp.software.ibm.com/aix/freeSoftware/aixtoolbox/INSTALLP/ppc/rpm.rte
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 11, 2002 Updated: March 29, 2002
Affected
Juniper Networks has completed an initial assessment of this vulnerability, and we believe that our implementation is not susceptible. Test programs show that our memory allocation algorithm correctly detects and warns about any attempt to exploit the vulnerability described in the CERT/CC advisory. We continue to evaluate the risks associated with this vulnerability. If we determine that the JUNOS software is susceptible, we will quickly issue any patches or software updates required to maintain the security of Juniper Networks routers. Future JUNOS software releases will include a corrected version of the libz code.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 11, 2002 Updated: March 14, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 11, 2002 Updated: March 14, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 11, 2002 Updated: March 14, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 23, 2002 Updated: July 05, 2002
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
MandrakeSoft has released several Mandrake Linux Security Update Advisories that address this issue. For more information, please see http://www.mandrakesecure.net/en/advisories/2002/MDKSA-2002-022.php http://www.mandrakesecure.net/en/advisories/2002/MDKSA-2002-023.php http://www.mandrakesecure.net/en/advisories/2002/MDKSA-2002-023-1.php http://www.mandrakesecure.net/en/advisories/2002/MDKSA-2002-024.php http://www.mandrakesecure.net/en/advisories/2002/MDKSA-2002-041.php
Notified: March 11, 2002 Updated: May 02, 2002
Not Affected
Microsoft conducted a thorough source-code level review of its products in response to the reports of vulnerabilities in zlib. This review did not discover any vulnerabilities related to these reports.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 11, 2002 Updated: March 14, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 23, 2002 Updated: April 29, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 23, 2002 Updated: March 22, 2002
Affected
NetBSD's malloc libraries are not vulnerable to double-free() attacks. The updated zlib will be included in future releases, but a Security Advisory will not be issued.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 11, 2002 Updated: March 14, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 11, 2002 Updated: March 14, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: April 12, 2002 Updated: April 14, 2002
Affected
Novell is working on a fix for Novell JVM for NetWare 1.3.1. We will post the fix in the May NDK. Version 1.4 will also have the fix in it. We will also update this statement with the URL to download the fix.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 23, 2002 Updated: March 22, 2002
Affected
OpenBSD is not vulnerable as OpenBSD's malloc implementation detects double freeing of memory. The zlib shipped with OpenBSD has been fixed in OpenBSD-current in January 2002.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 23, 2002 Updated: June 24, 2002
Affected
OpenSSH itself relies on zlib as a third party library. OpenSSH's internal malloc state might get corrupted if the double-free bug is present in zlib. At this moment, it is not known if this bug will allow an intruder to gain privileges. For some malloc implementation it is possible to detect and ignore the double-free. However, that is entirely dependent on the malloc implementation. Currently, it seems that *BSD operating systems might not be affected by this problem. We advise everybody to upgrade their third party libraries and recompile OpenSSH if necessary. Turning off compression in the server is possible only by removing zlib from myproposal.h and subsequent recompliation. Index: myproposal.h RCS file: /cvs/src/usr.bin/ssh/myproposal.h,v retrieving revision 1.13 diff -u -r1.13 myproposal.h --- myproposal.h 21 Jan 2002 22:30:12 -0000 1.13 +++ myproposal.h 12 Mar 2002 17:36:11 -0000 @@ -32,7 +32,7 @@ "hmac-md5,hmac-sha1,hmac-ripemd160," \ "hmac-ripemd160@openssh.com," \ "hmac-sha1-96,hmac-md5-96" -#define KEX_DEFAULT_COMP "none,zlib" !)+#define KEX_DEFAULT_COMP "none" #define KEX_DEFAULT_LANG ""
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 14, 2002 Updated: March 12, 2002
Affected
All versions of Openwall GNU/*/Linux (Owl) prior to the 2002/02/15 Owl-current snapshot are affected by the zlib double-free vulnerability. Owl-current after 2002/02/15 includes the proper fixes in its userland packages. In order to not place the users of other vendors' products at additional risk, we have agreed to delay documenting this as a security change and including the fixes in Owl 0.1-stable until there's a coordinated public announcement. While we don't normally support this kind of a policy (releasing a fix before there's an announcement), this time handling the vulnerability in this way was consistent with the state of things by the time the (already publicly known) bug was first realized to be a security vulnerability. The zlib bug could affect the following Owl packages: gnupg, openssh, rpm, texinfo (not necessarily in a security sense). Of these, the OpenSSH could potentially allow for an active remote attack resulting in a root compromise. If only SSH protocol version 1 is allowed in the OpenSSH server this is reduced to a local attack, but reverse remote attack possibilities by a malicious server remain. Additionally, any third-party software that makes use of the provided zlib library could be affected. Parts of the Linux 2.2 kernel included in Owl were also affected by the vulnerability. Fortunately, those parts (Deflate compression support for PPP and the experimental Deflate compression extension to IrDA) are normally not used by the Owl userland. The bug has been corrected starting with Linux 2.2.20-ow2 which has been made public and a part of both Owl-current and Owl 0.1-stable on 2002/03/03. This change, however, will only be documented in the publicly-available change logs on the coordinated public announcement date.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 11, 2002 Updated: March 14, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 07, 2002 Updated: March 14, 2002
Affected
Red Hat Linux ships with a zlib library that is vulnerable to this issue. Although most packages in Red Hat Linux use the shared zlib library we have identified a number of packages that either statically link to zlib or contain an internal version of the zlib code. Updates to zlib and these packages as well as our advisory note are available from the following URL. Users of the Red Hat Network can use the up2date tool to automatically upgrade their systems. http://www.redhat.com/support/errata/RHSA-2002-026.html Red Hat would like to thank CERT/CC for their help in coordinating this issue with other vendors.
The vendor has not provided us with any further information regarding this vulnerability.
Red Hat has published information regarding this vulnerability at the following locations: http://www.redhat.com/support/errata/RHSA-2002-026.html http://www.redhat.com/support/errata/RHSA-2002-027.html
Notified: February 23, 2002 Updated: February 25, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 23, 2002 Updated: April 17, 2003
Affected
-----BEGIN PGP SIGNED MESSAGE----- SGI Security Advisory Title: X Windows zlib/MIT-SHM/huge font DoS vulnerabilities
Number: 20021001-01-P
Date: October 15, 2002
References: CVE CAN-2002-164
References: CVE CVE-2002-0059
References: CERT CA-2002-07 - --- Issue Specifics --- This bulletin covers several graphics-related security issues: o It's been reported that the zlib libraries that ship with x_eoe
have a "double free" vulnerability. See: http://www.kb.cert.org/vuls/id/368819 o It's been reported that the IRIX X server has security vulnerabilities. 1) Under certain conditions, Mozilla can cause the X server to crash. See: http://web.lemuria.org/security/mozilla-dos.html for details. 2) There is a vulnerability in the MIT-SHM code that can allow a local
user to read or write to any SHM segment. See: http://www.linuxsecurity.com/advisories/caldera_advisory-2006.html SGI has investigated the issue and recommends the following steps for
neutralizing the exposure. It is HIGHLY RECOMMENDED that these measures be
implemented on ALL vulnerable SGI systems. These issues have been corrected in future releases of IRIX and with patches. - --- Impact --- The X server (/usr/bin/X11/Xsgi) is installed by default on IRIX 6.5 systems
as part of x_eoe.sw.Server. To determine the version of IRIX you are running, execute the following
command: # uname -R That will return a result similar to the following: # 6.5 6.5.16f The first number ("6.5") is the release name, the second ("6.5.15f" in this
case) is the extended release name. The extended release name is the
"version" we refer to throughout this document. Exploitation of these vulnerabilities can result in a root compromise or a
Denial of Service attack. A local account is required to exploit these
vulnerabilities. - --- Temporary Workaround --- There is no good workaround available for these problems if running in
graphical mode is desired. SGI recommends either upgrading to IRIX 6.5.18
when it is released, or installing the appropriate patch from the listing
below. If running in graphical mode is not needed, you can execute the command
"/usr/gfx/stopgfx" and it will turn the windowsystem configuration flag off,
kill the X server, and keep it from being restarted on next boot. - --- Solution --- SGI has provided a series of patches for these vulnerabilities. Our
recommendation is to upgrade to IRIX 6.5.18 when available, or install the
appropriate patch. OS Version Vulnerable? Patch # Other Actions IRIX 3.x unknown Note 1
IRIX 4.x unknown Note 1
IRIX 5.x unknown Note 1
IRIX 6.0.x unknown Note 1
IRIX 6.1 unknown Note 1
IRIX 6.2 unknown Note 1
IRIX 6.3 unknown Note 1
IRIX 6.4 unknown Note 1
IRIX 6.5 yes Notes 2 & 3
IRIX 6.5.1 yes Notes 2 & 3
IRIX 6.5.2 yes Notes 2 & 3
IRIX 6.5.3 yes Notes 2 & 3
IRIX 6.5.4 yes Notes 2 & 3
IRIX 6.5.5 yes Notes 2 & 3
IRIX 6.5.6 yes Notes 2 & 3
IRIX 6.5.7 yes Notes 2 & 3
IRIX 6.5.8 yes Notes 2 & 3
IRIX 6.5.9 yes Notes 2 & 3
IRIX 6.5.10 yes Notes 2 & 3
IRIX 6.5.11 yes Notes 2 & 3
IRIX 6.5.12 yes Notes 2 & 3
IRIX 6.5.13m yes 4709
IRIX 6.5.13f yes 4710
IRIX 6.5.14m yes 4648
IRIX 6.5.14f yes 4649
IRIX 6.5.15m yes 4648
IRIX 6.5.15f yes 4649
IRIX 6.5.16m yes 4663
IRIX 6.5.16f yes 4664
IRIX 6.5.17m yes 4757
IRIX 6.5.17f yes 4758 NOTES 1) This version of the IRIX operating has been retired. Upgrade to an
actively supported IRIX operating system. See
http://support.sgi.com/irix/news/index.html#policy for more
information. 2) If you have not received an IRIX 6.5.X CD for IRIX 6.5, contact your
SGI Support Provider or URL: http://support.sgi.com/irix/swupdates/ 3) Upgrade to IRIX 6.5.18. ##### Patch File Checksums #### The actual patch will be a tar file containing the following files: Filename: README.patch.4648
Algorithm #1 (sum -r): 19648 15 README.patch.4648
Algorithm #2 (sum): 13125 15 README.patch.4648
MD5 checksum: 763290A0BE49E2567CCF38B549B44A12 Filename: patch4648.chksums.only
Algorithm #1 (sum -r): 63642 4 patch4648.chksums.only
Algorithm #2 (sum): 3489 4 patch4648.chksums.only
MD5 checksum: 57F22AC9C442B369CA97B5FE40B1FFD3 Filename: patch4648.pgp.and.chksums
Algorithm #1 (sum -r): 19096 14 patch4648.pgp.and.chksums
Algorithm #2 (sum): 35174 14 patch4648.pgp.and.chksums
MD5 checksum: C1850DF90F1B478954029EB25B56A797 Filename: patchSG0004648
Algorithm #1 (sum -r): 28932 12 patchSG0004648
Algorithm #2 (sum): 14723 12 patchSG0004648
MD5 checksum: 3BB3B908AC0F03B03E18B997BA141D87 Filename: patchSG0004648.dev_sw
Algorithm #1 (sum -r): 16294 4954 patchSG0004648.dev_sw
Algorithm #2 (sum): 55525 4954 patchSG0004648.dev_sw
MD5 checksum: C14692DA3EB8C12BA8BD3E0348FFA293 Filename: patchSG0004648.dmedia_dev_sw
Algorithm #1 (sum -r): 54547 1427 patchSG0004648.dmedia_dev_sw
Algorithm #2 (sum): 12560 1427 patchSG0004648.dmedia_dev_sw
MD5 checksum: 6EC5EA9017F67D10FC235F4B4715D60A Filename: patchSG0004648.dmedia_eoe_sw
Algorithm #1 (sum -r): 14809 1058 patchSG0004648.dmedia_eoe_sw
Algorithm #2 (sum): 17027 1058 patchSG0004648.dmedia_eoe_sw
MD5 checksum: 75C87688D66029FD8A577494ED78E6CA Filename: patchSG0004648.idb
Algorithm #1 (sum -r): 45557 10 patchSG0004648.idb
Algorithm #2 (sum): 57173 10 patchSG0004648.idb
MD5 checksum: 3C3BC01AEB6866C663EED9639D8198E0 Filename: patchSG0004648.x_dev_sw
Algorithm #1 (sum -r): 51347 2830 patchSG0004648.x_dev_sw
Algorithm #2 (sum): 55679 2830 patchSG0004648.x_dev_sw
MD5 checksum: D3690E5AC5CB9D5E0807660A1EF55C2B Filename: patchSG0004648.x_dev_sw64
Algorithm #1 (sum -r): 23224 1766 patchSG0004648.x_dev_sw64
Algorithm #2 (sum): 2654 1766 patchSG0004648.x_dev_sw64
MD5 checksum: 8E19C61F4CD34B6930490C6724E592E3 Filename: patchSG0004648.x_eoe_sw
Algorithm #1 (sum -r): 31097 19287 patchSG0004648.x_eoe_sw
Algorithm #2 (sum): 47280 19287 patchSG0004648.x_eoe_sw
MD5 checksum: D4B3827EBBDC14A320E12818EC409EB3 Filename: patchSG0004648.x_eoe_sw64
Algorithm #1 (sum -r): 05516 3872 patchSG0004648.x_eoe_sw64
Algorithm #2 (sum): 41234 3872 patchSG0004648.x_eoe_sw64
MD5 checksum: EDFE10A12E6AFC0D0846DA9B5BFF1FB0 Filename: README.patch.4649
Algorithm #1 (sum -r): 07444 15 README.patch.4649
Algorithm #2 (sum): 13141 15 README.patch.4649
MD5 checksum: C5538980016C96C3D1E60F1F86298AAE Filename: patchSG0004649
Algorithm #1 (sum -r): 47428 12 patchSG0004649
Algorithm #2 (sum): 14587 12 patchSG0004649
MD5 checksum: 4C416CCBF8169CCD41183AA952BF68E5 Filename: patchSG0004649.dev_sw
Algorithm #1 (sum -r): 44079 4956 patchSG0004649.dev_sw
Algorithm #2 (sum): 10141 4956 patchSG0004649.dev_sw
MD5 checksum: AFA1E08A8C3C5A251F9097CE11248E3B Filename: patchSG0004649.dmedia_dev_sw
Algorithm #1 (sum -r): 11964 1428 patchSG0004649.dmedia_dev_sw
Algorithm #2 (sum): 38664 1428 patchSG0004649.dmedia_dev_sw
MD5 checksum: EF0DAF20D2294F9C35E4D01FA7769D0E Filename: patchSG0004649.dmedia_eoe_sw
Algorithm #1 (sum -r): 39189 1058 patchSG0004649.dmedia_eoe_sw
Algorithm #2 (sum): 14792 1058 patchSG0004649.dmedia_eoe_sw
MD5 checksum: 6E83F4B6D9B59FD50197B789ED79D52B Filename: patchSG0004649.idb
Algorithm #1 (sum -r): 37792 10 patchSG0004649.idb
Algorithm #2 (sum): 51498 10 patchSG0004649.idb
MD5 checksum: F9182410F6DA9FF347D3DAA4D6372F8A Filename: patchSG0004649.x_dev_sw
Algorithm #1 (sum -r): 57772 2831 patchSG0004649.x_dev_sw
Algorithm #2 (sum): 3606 2831 patchSG0004649.x_dev_sw
MD5 checksum: 2B8752ABCCB9D4178CD7EA5595ED4B27 Filename: patchSG0004649.x_dev_sw64
Algorithm #1 (sum -r): 09443 1767 patchSG0004649.x_dev_sw64
Algorithm #2 (sum): 12618 1767 patchSG0004649.x_dev_sw64
MD5 checksum: 519B9D3CF7C561C33E66E58C04E355F8 Filename: patchSG0004649.x_eoe_sw
Algorithm #1 (sum -r): 45988 19291 patchSG0004649.x_eoe_sw
Algorithm #2 (sum): 55233 19291 patchSG0004649.x_eoe_sw
MD5 checksum: C47659D9AFA1B1D8A980AEBF3369FC7D Filename: patchSG0004649.x_eoe_sw64
Algorithm #1 (sum -r): 63429 3914 patchSG0004649.x_eoe_sw64
Algorithm #2 (sum): 42601 3914 patchSG0004649.x_eoe_sw64
MD5 checksum: 7FEB20B624CDF12994963466B8339E0F Filename: README.patch.4663
Algorithm #1 (sum -r): 20333 12 README.patch.4663
Algorithm #2 (sum): 7518 12 README.patch.4663
MD5 checksum: D015F7A81554A08D88B75A190BA5EF23 Filename: patchSG0004663
Algorithm #1 (sum -r): 26976 8 patchSG0004663
Algorithm #2 (sum): 51679 8 patchSG0004663
MD5 checksum: 3127F7F8CD6D3859C329478F29989509 Filename: patchSG0004663.dev_sw
Algorithm #1 (sum -r): 50053 4944 patchSG0004663.dev_sw
Algorithm #2 (sum): 1123 4944 patchSG0004663.dev_sw
MD5 checksum: 612336109805B45764EB5EA9F997C27E Filename: patchSG0004663.dmedia_eoe_sw
Algorithm #1 (sum -r): 09775 2052 patchSG0004663.dmedia_eoe_sw
Algorithm #2 (sum): 15288 2052 patchSG0004663.dmedia_eoe_sw
MD5 checksum: 7B78D73D67C80D9F37FE132134E55AE2 Filename: patchSG0004663.idb
Algorithm #1 (sum -r): 06345 9 patchSG0004663.idb
Algorithm #2 (sum): 20713 9 patchSG0004663.idb
MD5 checksum: C9A228449A0D5A8F78B3D3DE31FDC789 Filename: patchSG0004663.x_dev_sw
Algorithm #1 (sum -r): 29626 2912 patchSG0004663.x_dev_sw
Algorithm #2 (sum): 22721 2912 patchSG0004663.x_dev_sw
MD5 checksum: 1AD91E3743B44EB9D239A7FF8B3DCCBE Filename: patchSG0004663.x_dev_sw64
Algorithm #1 (sum -r): 50100 1768 patchSG0004663.x_dev_sw64
Algorithm #2 (sum): 37585 1768 patchSG0004663.x_dev_sw64
MD5 checksum: F01B4440B72B7C355F0083BCBD02AB62 Filename: patchSG0004663.x_eoe_sw
Algorithm #1 (sum -r): 39553 17149 patchSG0004663.x_eoe_sw
Algorithm #2 (sum): 7971 17149 patchSG0004663.x_eoe_sw
MD5 checksum: F8677AF45C45F8BCC628A9B4B72E1C36 Filename: patchSG0004663.x_eoe_sw64
Algorithm #1 (sum -r): 28690 3895 patchSG0004663.x_eoe_sw64
Algorithm #2 (sum): 43249 3895 patchSG0004663.x_eoe_sw64
MD5 checksum: E9D8885D8D0EABD464D622A6B8C20A0B Filename: README.patch.4664
Algorithm #1 (sum -r): 52142 12 README.patch.4664
Algorithm #2 (sum): 7572 12 README.patch.4664
MD5 checksum: 5D4E5F9F443D4BFAA5B16B87EE04FF82 Filename: patchSG0004664
Algorithm #1 (sum -r): 16851 8 patchSG0004664
Algorithm #2 (sum): 58003 8 patchSG0004664
MD5 checksum: F1FDDAED26791293E2C40CA11309EE73 Filename: patchSG0004664.dev_sw
Algorithm #1 (sum -r): 06665 4969 patchSG0004664.dev_sw
Algorithm #2 (sum): 61714 4969 patchSG0004664.dev_sw
MD5 checksum: C3C1B3F7027E8CFA2007C270BDBB98C9 Filename: patchSG0004664.dmedia_eoe_sw
Algorithm #1 (sum -r): 37664 2052 patchSG0004664.dmedia_eoe_sw
Algorithm #2 (sum): 46869 2052 patchSG0004664.dmedia_eoe_sw
MD5 checksum: 23562ECDE183910E728C5D082B280352 Filename: patchSG0004664.idb
Algorithm #1 (sum -r): 17964 9 patchSG0004664.idb
Algorithm #2 (sum): 20986 9 patchSG0004664.idb
MD5 checksum: 64ECD84929751DD84934FD0B92A92AA7 Filename: patchSG0004664.x_dev_sw
Algorithm #1 (sum -r): 17678 2912 patchSG0004664.x_dev_sw
Algorithm #2 (sum): 37775 2912 patchSG0004664.x_dev_sw
MD5 checksum: 547263071E4481C4FE7C72B5CB988837 Filename: patchSG0004664.x_dev_sw64
Algorithm #1 (sum -r): 51740 1771 patchSG0004664.x_dev_sw64
Algorithm #2 (sum): 30768 1771 patchSG0004664.x_dev_sw64
MD5 checksum: D4078363D7F450D5907B98D61F12C4A5 Filename: patchSG0004664.x_eoe_sw
Algorithm #1 (sum -r): 56676 17144 patchSG0004664.x_eoe_sw
Algorithm #2 (sum): 42847 17144 patchSG0004664.x_eoe_sw
MD5 checksum: A8894B977CFEB0CEEE115CD252BB2D6D Filename: patchSG0004664.x_eoe_sw64
Algorithm #1 (sum -r): 44535 3903 patchSG0004664.x_eoe_sw64
Algorithm #2 (sum): 13310 3903 patchSG0004664.x_eoe_sw64
MD5 checksum: E564EA0AFB18EF77A67BB1E90C67346C Filename: README.patch.4709
Algorithm #1 (sum -r): 54795 10 README.patch.4709
Algorithm #2 (sum): 5764 10 README.patch.4709
MD5 checksum: 02B6646BEAD5220EB028B8DDA890FC45 Filename: patchSG0004709
Algorithm #1 (sum -r): 19667 5 patchSG0004709
Algorithm #2 (sum): 13760 5 patchSG0004709
MD5 checksum: 8779F029143A7E7A0C2463D2817F75ED Filename: patchSG0004709.dmedia_eoe_sw
Algorithm #1 (sum -r): 55325 2024 patchSG0004709.dmedia_eoe_sw
Algorithm #2 (sum): 54859 2024 patchSG0004709.dmedia_eoe_sw
MD5 checksum: 4C3798409C8C8208CF4CBE0458C9BBC4 Filename: patchSG0004709.idb
Algorithm #1 (sum -r): 13705 5 patchSG0004709.idb
Algorithm #2 (sum): 59734 5 patchSG0004709.idb
MD5 checksum: 82DE19E57E969FD31BDF129F4EC20208 Filename: patchSG0004709.x_dev_sw
Algorithm #1 (sum -r): 40202 240 patchSG0004709.x_dev_sw
Algorithm #2 (sum): 38774 240 patchSG0004709.x_dev_sw
MD5 checksum: 9EF6548A89FFBF6E0C55DBAD86F90EF8 Filename: patchSG0004709.x_dev_sw64
Algorithm #1 (sum -r): 09364 151 patchSG0004709.x_dev_sw64
Algorithm #2 (sum): 24763 151 patchSG0004709.x_dev_sw64
MD5 checksum: F5123FBF8FB1E7D40C0AE76B32B30A35 Filename: patchSG0004709.x_eoe_sw
Algorithm #1 (sum -r): 63497 11653 patchSG0004709.x_eoe_sw
Algorithm #2 (sum): 55851 11653 patchSG0004709.x_eoe_sw
MD5 checksum: C044A9D8826209D129CA408A2942EE9C Filename: README.patch.4710
Algorithm #1 (sum -r): 33104 10 README.patch.4710
Algorithm #2 (sum): 5672 10 README.patch.4710
MD5 checksum: FF470C94A047A26BE948B1B6B395D0BA Filename: patchSG0004710
Algorithm #1 (sum -r): 54983 5 patchSG0004710
Algorithm #2 (sum): 18095 5 patchSG0004710
MD5 checksum: 8BBA0355F5697B25AD14FC0F77F4DBB3 Filename: patchSG0004710.dmedia_eoe_sw
Algorithm #1 (sum -r): 58724 2030 patchSG0004710.dmedia_eoe_sw
Algorithm #2 (sum): 54553 2030 patchSG0004710.dmedia_eoe_sw
MD5 checksum: 250A8F059CC1CBED9103B817CDA55DFB Filename: patchSG0004710.idb
Algorithm #1 (sum -r): 37173 5 patchSG0004710.idb
Algorithm #2 (sum): 60119 5 patchSG0004710.idb
MD5 checksum: AA92D95A35FD3E871BF66D29294186C2 Filename: patchSG0004710.x_dev_sw
Algorithm #1 (sum -r): 43943 240 patchSG0004710.x_dev_sw
Algorithm #2 (sum): 18781 240 patchSG0004710.x_dev_sw
MD5 checksum: B2F06D058040310C5C67A254080F5734 Filename: patchSG0004710.x_dev_sw64
Algorithm #1 (sum -r): 34551 151 patchSG0004710.x_dev_sw64
Algorithm #2 (sum): 20425 151 patchSG0004710.x_dev_sw64
MD5 checksum: 2DBE25A690C2F18A5643DE82256C6841 Filename: patchSG0004710.x_eoe_sw
Algorithm #1 (sum -r): 35591 11635 patchSG0004710.x_eoe_sw
Algorithm #2 (sum): 55324 11635 patchSG0004710.x_eoe_sw
MD5 checksum: 64183364C94F0D08BFD70960A7D7AE0D Filename: README.patch.4757
Algorithm #1 (sum -r): 31919 9 README.patch.4757
Algorithm #2 (sum): 6853 9 README.patch.4757
MD5 checksum: 59C90A013D404F56C60BECF6E49F9532 Filename: patchSG0004757
Algorithm #1 (sum -r): 51651 2 patchSG0004757
Algorithm #2 (sum): 43183 2 patchSG0004757
MD5 checksum: F035444DC5A27037DBAB67138505A8AF Filename: patchSG0004757.idb
Algorithm #1 (sum -r): 38944 3 patchSG0004757.idb
Algorithm #2 (sum): 51661 3 patchSG0004757.idb
MD5 checksum: D8D62F8BBEC9B4660D1EA726B57F8AA9 Filename: patchSG0004757.x_eoe_sw
Algorithm #1 (sum -r): 18457 11235 patchSG0004757.x_eoe_sw
Algorithm #2 (sum): 12989 11235 patchSG0004757.x_eoe_sw
MD5 checksum: 35BE4F4C9FE12BCB2489A56EC14EDD07 Filename: README.patch.4758
Algorithm #1 (sum -r): 07884 9 README.patch.4758
Algorithm #2 (sum): 6869 9 README.patch.4758
MD5 checksum: 8BADEE8856A97B2F67AB7CB8C6A74D4B Filename: patchSG0004758
Algorithm #1 (sum -r): 15890 2 patchSG0004758
Algorithm #2 (sum): 40799 2 patchSG0004758
MD5 checksum: A362C93D014DFBE7E881038BA959BF04 Filename: patchSG0004758.idb
Algorithm #1 (sum -r): 63456 3 patchSG0004758.idb
Algorithm #2 (sum): 51709 3 patchSG0004758.idb
MD5 checksum: 7DDE5D803277DCA82EFB33D63DFA5DB9 Filename: patchSG0004758.x_eoe_sw
Algorithm #1 (sum -r): 33795 11219 patchSG0004758.x_eoe_sw
Algorithm #2 (sum): 16001 11219 patchSG0004758.x_eoe_sw
MD5 checksum: B3D9040A5B1FE3A546860AA8CB0B0F1B - --- References --- SGI Security Advisories can be found at: http://www.sgi.com/support/security/ and
ftp://patches.sgi.com/support/free/security/advisories/ SGI Security Patches can be found at: http://www.sgi.com/support/security/ and
ftp://patches.sgi.com/support/free/security/patches/ SGI patches for IRIX can be found at the following patch servers: http://support.sgi.com/irix/ and ftp://patches.sgi.com/ SGI freeware updates for IRIX can be found at: http://freeware.sgi.com/ SGI fixes for SGI open sourced code can be found on: http://oss.sgi.com/projects/ SGI patches and RPMs for Linux can be found at: http://support.sgi.com/linux/ or
http://oss.sgi.com/projects/sgilinux-combined/download/security-fixes/ SGI patches for Windows NT or 2000 can be found at: http://support.sgi.com/nt/ IRIX 5.2-6.4 Recommended/Required Patch Sets can be found at: http://support.sgi.com/irix/ and ftp://patches.sgi.com/support/patchset/ IRIX 6.5 Maintenance Release Streams can be found at: http://support.sgi.com/colls/patches/tools/relstream/index.html IRIX 6.5 Software Update CDs can be obtained from: http://support.sgi.com/irix/swupdates/ The primary SGI anonymous FTP site for security advisories and patches is
patches.sgi.com (216.32.174.211). Security advisories and patches are
located under the URL ftp://patches.sgi.com/support/free/security/ For security and patch management reasons, ftp.sgi.com (mirrors
patches.sgi.com security FTP repository) lags behind and does not do a
real-time update. - --- Acknowledgments ---- SGI wishes to thank FIRST and the users of the Internet Community at large
for their assistance in this matter. - --- SGI Security Information/Contacts --- If there are questions about this document, email can be sent to
security-info@sgi.com. ------oOo------ SGI provides security information and patches for use by the entire SGI
community. This information is freely available to any person needing the
information and is available via anonymous FTP and the Web. The primary SGI anonymous FTP site for security advisories and patches is
patches.sgi.com (216.32.174.211). Security advisories and patches are
located under the URL ftp://patches.sgi.com/support/free/security/ The SGI Security Headquarters Web page is accessible at the URL: http://www.sgi.com/support/security/ For issues with the patches on the FTP sites, email can be sent to
security-info@sgi.com. For assistance obtaining or working with security patches, please
contact your SGI support provider. ------oOo------ SGI provides a free security mailing list service called wiretap and
encourages interested parties to self-subscribe to receive (via email) all
SGI Security Advisories when they are released. Subscribing to the mailing
list can be done via the Web
(http://www.sgi.com/support/security/wiretap.html) or by sending email to
SGI as outlined below. % mail wiretap-request@sgi.com
subscribe wiretap
The vendor has not provided us with any further information regarding this vulnerability.
Please note that the above section contains two SGI security advisories.
Updated: March 15, 2002
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Slackware has published the following information regarding this vulnerability: http://www.slackware.com/lists/archive/viewer.php?l=slackware-security&y=2002&m=slackware-security.260865 http://www.slackware.com/lists/archive/viewer.php?l=slackware-security&y=2002&m=slackware-security.218674 http://www.slackware.com/lists/archive/viewer.php?l=slackware-security&y=2002&m=slackware-security.200300
Notified: February 23, 2002 Updated: February 25, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 14, 2002 Updated: March 21, 2002
Not Affected
SSH Secure Shell is not vulnerable to zlib double free bug. No version of SSH Secure Shell software is vulnerable to the "Double Free Bug in zlib Compression Library" discussed in CERT Advisory CA-2002-07. All SSH Secure Shell versions, including SSH2 protocol clients and servers, close the connection immediately with a fatal cleanup call without any further calls to zlib when a call to zlib's inflate() returns something else than Z_OK.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 23, 2002 Updated: April 17, 2003
Affected
Solaris 8 includes the zlib library as part of the SUNWzlib package which is affected by this issue. Open Windows 3.6.1 (for Solaris 7) and Open Windows 3.6.2 (for Solaris 8) ship a version of zlib which is affected in recent patches. Sun has produced patches for both Solaris and Open Windows which address this issue. The impact and patch details are described in Sun Alert 43541 available here: http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?doc=fsalert%2F43541
The vendor has not provided us with any further information regarding this vulnerability.
-----BEGIN PGP SIGNED MESSAGE----- Sun Microsystems, Inc. Security Bulletin Bulletin Number: #00220 Date: November 19, 2002 Cross-Ref: http://www.cert.org/advisories/CA-2002-07.html Title: Double Free bug in zlib compression library The information contained in this Security Bulletin is provided "AS IS." Sun makes no warranties of any kind whatsoever with respect to the information contained in this Security Bulletin. ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY WARRANTY OF NON-INFRINGEMENT OR IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE HEREBY DISCLAIMED AND EXCLUDED TO THE EXTENT ALLOWED BY APPLICABLE LAW. IN NO EVENT WILL SUN MICROSYSTEMS, INC. BE LIABLE FOR ANY LOST REVENUE, PROFIT OR DATA, OR FOR DIRECT, SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES HOWEVER CAUSED AND REGARDLESS OF ANY THEORY OF LIABILITY ARISING OUT OF THE USE OF OR INABILITY TO USE THE INFORMATION CONTAINED IN THIS SECURITY BULLETIN, EVEN IF SUN MICROSYSTEMS, INC. HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. If any of the above provisions are held to be in violation of applicable law, void, or unenforceable in any jurisdiction, then such provisions are waived to the extent necessary for this disclaimer to be otherwise enforceable in such jurisdiction. 1. Background CERT has reported a bug in the zlib compression library (see www.cert.org/advisories/CA-2002-07.html). Sun's implementations of the Java(TM) Runtime Environment include zlib and are affected. This bug may allow malicious code to corrupt memory and possibly crash the Java Runtime Environment. The full and custom installations of Netscape 7 for Linux and the full and custom installations of Netscape 6 for Linux and Windows are affected since they include an affected version of the Java Runtime Environment. The default Java runtime environment of Netscape 7 for Windows is not affected. The default Java runtime environment of Netscape(TM) Communicator version 4.x is also not affected. For more information, see http://home.netscape.com/security The Microsoft VM is not affected. This issue may or may not affect other vendors' Java technology implementations which are derived from Sun's SDK and JDK(TM) source bases. Sun has notified and made the remedy available to its Java technology licensees. Sun recommends that users of affected releases upgrade to the latest SDK and JRE releases listed in section 3 of this bulletin. 2. Affected Releases The following releases are affected: Windows Production Releases SDK and JRE 1.4.0 SDK and JRE 1.3.1_03 or earlier SDK and JRE 1.3.0_05 or earlier SDK and JRE 1.2.2_011 or earlier JDK and JRE 1.1.8_009 or earlier Solaris(TM) Operating Environment (OE) Reference Releases SDK and JRE 1.2.2_011 or earlier JDK and JRE 1.1.8_009 or earlier Solaris OE Production Releases SDK and JRE 1.4.0 SDK and JRE 1.3.1_03 or earlier SDK and JRE 1.3.0_05 or earlier SDK and JRE 1.2.2_11 or earlier JDK and JRE 1.1.8_15 or earlier Linux Production Releases SDK and JRE 1.4.0 SDK and JRE 1.3.1_03 or earlier SDK and JRE 1.3.0_05 or earlier SDK and JRE 1.2.2_011 or earlier Releases for JDK and JRE 1.1.x should no longer be used. Users of these releases should upgrade to a later release listed in Section 3 of this bulletin. This vulnerability does not affect the Java 2 SDK, Standard Edition, v 1.4.1 release. 3. Latest Releases Windows Production Releases SDK and JRE 1.4.1_01 http://java.sun.com/j2se/1.4/ SDK and JRE 1.4.0_03 http://java.sun.com/j2se/1.4/ SDK and JRE 1.3.1_06 http://java.sun.com/j2se/1.3/ SDK and JRE 1.2.2_014 http://java.sun.com/j2se/1.2/ Solaris OE Reference Releases SDK and JRE 1.2.2_014 http://java.sun.com/j2se/1.2/ Solaris OE Production Releases SDK and JRE 1.4.1_01 http://java.sun.com/j2se/1.4/ SDK and JRE 1.4.0_03 http://java.sun.com/j2se/1.4/ SDK and JRE 1.3.1_06 http://java.sun.com/j2se/1.3/ SDK and JRE 1.2.2_14 http://java.sun.com/j2se/1.2/ Linux Production Releases SDK and JRE 1.4.1_01 http://java.sun.com/j2se/1.4/ SDK and JRE 1.4.0_03 http://java.sun.com/j2se/1.4/ SDK and JRE 1.3.1_06 http://java.sun.com/j2se/1.3/ SDK and JRE 1.2.2_014 http://java.sun.com/j2se/1.2/ APPENDICES A. Sun security bulletins are available at: http://sunsolve.sun.com/security B. Sun Security Coordination Team's PGP key is available at: http://sunsolve.sun.com/pgpkey.txt C. To report or inquire about a security problem with Sun software, contact one or more of the following: - Your local Sun answer centers - Your representative computer security response team, such as CERT - Sun Security Coordination Team. Send email to: security-alert@sun.com D. To receive information or subscribe to our CWS (Customer Warning System) mailing list, send email to: security-alert@sun.com with a subject line (not body) containing one of the following commands: Command Information Returned/Action Taken help An explanation of how to get information key Sun Security Coordination Team's PGP key list A list of current security topics query [topic] The email is treated as an inquiry and is forwarded to the Security Coordination Team report [topic] The email is treated as a security report and is forwarded to the Security Coordination Team. Please encrypt sensitive mail using Sun Security Coordination Team's PGP key send topic A short status summary or bulletin. For example, to retrieve a Security Bulletin #00138, supply the following in the subject line (not body): send #138 subscribe Sender is added to our mailing list. To subscribe, supply the following in the subject line (not body): subscribe cws your-email-address Note that your-email-address should be substituted by your email address. unsubscribe Sender is removed from the CWS mailing list. Copyright 2002 Sun Microsystems, Inc. All rights reserved. Sun, Sun Microsystems, the Sun logo, Solaris, Java, and JDK are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. Netscape is a trademark or registered trademark of Netscape Communications Corporation in the United States and other countries. This Security Bulletin may be reproduced and distributed, provided that this Security Bulletin is not modified in any way and is attributed to Sun Microsystems, Inc. and provided that such reproduction and distribution is performed for non-commercial purposes. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBPdmbN7dzzzOFBFjJAQF15AP/ePxAuzsiDIObaPpdQN9Ac04MdawPMrAw tC6n2PbFvqwh37hwUFed+Sp2ctGSyUPGKpNZ4jpENlALzp4cJJGnWD/6f8yJG3xT Tv1QH+hHcVCsAqZ9QNxn0Nna1iM7/vGx4RKbtptx6HkH2O2/JHnIVw5D2v9eid7A F/+N2U1p9Jg= =nQ5Y -----END PGP SIGNATURE-----
Notified: March 12, 2002 Updated: June 27, 2002
Affected
All SuSE Linux versions previous to 8.0 are affected by this issue. We have released security updates for zlib itself, as well as several packages including their own copy of zlib. Details on this issue, as well as the list of packages to upgrade, can be found in our advisory at: http://www.suse.de/de/support/security/2002_010_libz_txt.html http://www.suse.de/de/support/security/2002_011_libz_packages_txt.html
The vendor has not provided us with any further information regarding this vulnerability.
Additionally, SuSE has published the following security advisories on this issue: http://www.suse.com/de/support/security/openssh_1_txt.html http://www.suse.com/de/support/security/openssh_2_txt.html http://www.suse.com/de/support/security/openssh_3_txt.html
Notified: April 27, 2002 Updated: April 29, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: February 23, 2002 Updated: April 05, 2002
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Caldera has released Security Advisory CSSA-2002-015.0 to address this issue. For more information, please see http://www.caldera.com/support/security/advisories/CSSA-2002-015.0.txt
Notified: February 23, 2002 Updated: February 25, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 18, 2002 Updated: March 18, 2002
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Trustix has released Trustix Secure Linux Security Advisory #2002-0040 to address this issue. For further information, please see http://www.trustix.org/pipermail/tsl-announce/2002-March/000082.html
Notified: February 23, 2002 Updated: February 25, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 11, 2002 Updated: March 14, 2002
Unknown
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 05, 2002 Updated: March 11, 2002
Affected
XFree86 versions 4.0 through 4.2.0 include zlib version 1.0.8. XFree86 3.x includes zlib version 1.0.4. The zlib code included with XFree86 is only used on some platforms. This is determined by the setting of HasZlib in the imake config files in the xc/config/cf source directory. If HasZlib is set to YES in the platform's vendor.cf file(s), then the system-provided zlib is used instead of the XFree86-provided version. XFree86 uses the system-provided zlib by default only on the following platforms: FreeBSD 2.2 and later NetBSD 1.2.2 and later OpenBSD Darwin Debian Linux The zlib code in XFree86 has been fixed in the CVS repository (trunk and the xf-4_2-branch branch) as of 14 February 2002. A source patch for XFree86 4.2.0 will be available from ftp://ftp.xfree86.org/pub/XFree86/4.2.0/fixes/. The following XFree86 4.2.0 binary distributions provided by XFree86 include and use a vulnerable version of zlib: Linux-alpha-glibc22 Linux-ix86-glibc22 When updated binaries are available, it'll be documented at http://www.xfree86.org/4.2.0/UPDATES.html. To check if an installation of XFree86 includes zlib, see if the following file exists: /usr/X11R6/lib/libz.a To check if an XFree86 X server is dynamically linked with zlib, look for a line containing 'libz' in the output of 'ldd /usr/X11R6/bin/XFree86'. Various vendors repackage and distribute XFree86, and may use settings and configurations different from those described here.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Notified: March 05, 2002 Updated: March 08, 2002
Affected
All users of zlib versions 1.1.3 or earlier should obtain the latest version, 1.1.4 or later, from http://www.zlib.org, in order to avoid this vulnerability as well as other possible vulnerabilities in versions prior to 1.1.3 when decompressing invalid data.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.