|
![]() |
Problem Description |
The perl Compress::Zlib module contains an internal copy of the zlib
library that was vulnerable to CAN-2005-1849 and CAN-2005-2096. This
library was updated with version 1.35 of Compress::Zlib.
An updated perl-Compress-Zlib package is now available to provide the
fixed module.
Updated Packages |
Mandrakelinux 10.1
e7923b362b8ef2fb3d806371a69df7aa 10.1/RPMS/perl-Compress-Zlib-1.37-0.1.101mdk.i586.rpm 0b7fbd7ae4c245b400d46f57ea63bf90 10.1/SRPMS/perl-Compress-Zlib-1.37-0.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64
8f052c92f3f9d0d7f1ad006356348405 x86_64/10.1/RPMS/perl-Compress-Zlib-1.37-0.1.101mdk.x86_64.rpm 0b7fbd7ae4c245b400d46f57ea63bf90 x86_64/10.1/SRPMS/perl-Compress-Zlib-1.37-0.1.101mdk.src.rpm
Corporate Server 2.1
c5e5e4bdde847a0a962dd1f0f57180da corporate/2.1/RPMS/perl-Compress-Zlib-1.37-0.1.C21mdk.i586.rpm 7753a97ea1f7f2e635866d1457c08122 corporate/2.1/SRPMS/perl-Compress-Zlib-1.37-0.1.C21mdk.src.rpm
Corporate Server 2.1/X86_64
ea6a1a6cc1cdcbc3c23aea81aa0a87d4 x86_64/corporate/2.1/RPMS/perl-Compress-Zlib-1.37-0.1.C21mdk.x86_64.rpm 7753a97ea1f7f2e635866d1457c08122 x86_64/corporate/2.1/SRPMS/perl-Compress-Zlib-1.37-0.1.C21mdk.src.rpm
Corporate Server 3.0
c33b659717b2723bb1c947ac6441db14 corporate/3.0/RPMS/perl-Compress-Zlib-1.37-0.1.C30mdk.i586.rpm adfd2f029c30a1e289d8f827bba46946 corporate/3.0/SRPMS/perl-Compress-Zlib-1.37-0.1.C30mdk.src.rpm
Corporate Server 3.0/X86_64
0a0e03e272d075dee7345b3196d7b0ea x86_64/corporate/3.0/RPMS/perl-Compress-Zlib-1.37-0.1.C30mdk.x86_64.rpm adfd2f029c30a1e289d8f827bba46946 x86_64/corporate/3.0/SRPMS/perl-Compress-Zlib-1.37-0.1.C30mdk.src.rpm
Mandriva Linux LE2005
b4b17d14d3565862ce8368c71734e74c 10.2/RPMS/perl-Compress-Zlib-1.37-0.1.102mdk.i586.rpm 8a4ace379976089460eefea2859a1b31 10.2/SRPMS/perl-Compress-Zlib-1.37-0.1.102mdk.src.rpm
Mandriva Linux LE2005/X86_64
07b74796e2e3b8a1ea72ef1fbdb8d47b x86_64/10.2/RPMS/perl-Compress-Zlib-1.37-0.1.102mdk.x86_64.rpm 8a4ace379976089460eefea2859a1b31 x86_64/10.2/SRPMS/perl-Compress-Zlib-1.37-0.1.102mdk.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.