A buffer overflow in a library common to most Linux systems could cause a serious security hole that allows those systems to be remotely attacked and taken over, according to a security alert issued by Linux security firm Guardian Digital Inc.
The flaw is in a component called zlib, which is used for file decompression in programs such as the GNU Compiler Collection development environment, the Mozilla Web browser and the X11 system which is used by some Linux installations to draw windows, according to the alert from the Upper Saddle River, New Jersey-based firm.
A buffer overflow results when the amount of memory assigned to a program or task is overrun, often allowing an attacker to execute code. In this case, programs that use the zlib component for network compression are vulnerable to attack due to the flaw, Guardian Digital said.
The hole is even more serious because many programs link to zlib and thereby inherit the same vulnerability, the alert said. Because of this, many different software packages will have to be updated or patched to fix the vulnerability, according to Guardian Digital.
No exploit is currently known to exist for the vulnerability, the company said.
Users should consult Linux operating system vendors for patches or fixes.