NetBSD Information for VU#680620
zlib inflate() routine vulnerable to buffer overflow
- Vendor Information Help Date Notified: 11 Jul 2005
- Statement Date:
- Date Updated: 11 Jul 2005
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
-----BEGIN PGP SIGNED MESSAGE-----
NetBSD Security Note 20050708-1
Topic: NetBSD base system not vulnerable to zlib overflow
pkgsrc did provide vulnerable versions
A zlib buffer overflow has been announced.
The NetBSD Security Officer team was aware of this issue, and would
like to reassure users that the NetBSD base system is not vulnerable.
The bug was introduced in changes to zlib after 1.1.4, the latest
version supplied in the base install of NetBSD.
The vulnerable version, 1.2.2 has been available from pkgsrc.
Users of the audit-packages tool will already have noticed that version
is marked as vulnerable, and the 1.2.2nb1 update addresses the issue.
Other pkgsrc users are encouraged to update devel/zlib to 1.2.2nb1, as
well as to take advantage of the security/audit-packages infrastructure.
Information about NetBSD and NetBSD security can be found at
http://www.NetBSD.org/ and http://www.NetBSD.org/Security/.
Copyright 2005, The NetBSD Foundation, Inc. All Rights Reserved.
Redistribution permitted only in full, unmodified form.
$NetBSD: NetBSD-SN20050708-1.txt,v 1.1 2005/07/08 15:54:11 david Exp $
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (NetBSD)
-----END PGP SIGNATURE-----
If you have feedback, comments, or additional information about this vulnerability, please send us email.