USN-151-2: zlib vulnerabilities

Publication date

23 July 2005

Overview

zlib vulnerabilities

Releases


Details

USN-148-1 and USN-151-1 fixed two security flaws in zlib, which could
be exploited to cause Denial of Service attacks or even arbitrary code
execution with malicious data streams.

Most applications use the shared library provided by the “zlib1g”
package; however, some packages contain copies of the affected zlib
code, so they need to be upgraded as well.

USN-148-1 and USN-151-1 fixed two security flaws in zlib, which could
be exploited to cause Denial of Service attacks or even arbitrary code
execution with malicious data streams.

Most applications use the shared library provided by the “zlib1g”
package; however, some packages contain copies of the affected zlib
code, so they need to be upgraded as well.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
5.04 hoary amd64-libs-dev – 
ia32-libs – 
ia32-libs-dev – 
amd64-libs – 
dpkg-dev – 
dselect – 
dpkg – 
4.10 warty amd64-libs-dev – 
ia32-libs – 
ia32-libs-dev – 
amd64-libs – 
dpkg-dev – 
dselect – 
dpkg – 

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›