markus
Verified User
zlib 1.2.2 vulnerability / 1.2.3 released!
~~~~~~~~~~ Original Post ~~~~~~~~~~
Quoting from the zlib homepage:
I would recommend to subscribe to the zlib announcements mailing list, just in case:
http://zlib.net/mailman/listinfo/zlib-announce_madler.net
I have also found an interesting page which describes how to identify program binaries which include statically linked copies of zlib:
http://www.enyo.de/fw/security/zlib-fingerprint/
Cheers
zlib users,
zlib verison 1.2.3 has been released. It eliminates a newly discovered
security vulnerability in zlib 1.2.2 for which specially crafted
compressed input can cause inflate to overflow a fixed-size array in
the internal inflate data structure. All users of zlib 1.2.1 or 1.2.2
should upgrade to zlib 1.2.3. It is available here:
http://www.zlib.net/
For now, you should use the first link for each of the distribution
files, the one on zlib.net, as not all of the links work yet.
Mark Adler
_______________________________________________
Zlib-announce mailing list
[email protected]
http://madler.net/mailman/listinfo/zlib-announce_madler.net
~~~~~~~~~~ Original Post ~~~~~~~~~~
Quoting from the zlib homepage:
The latest version is still 1.2.2, which is the one installed by DA.IMPORTANT NOTE: (July 10, 2005) A new security vulnerability has been discovered in which specially crafted input files can cause inflate to overwrite memory that follows the internal inflate state. This can cause the application to crash depending on what is overwritten. This vulnerability only affects versions 1.2.1 and 1.2.2. of zlib. Earlier versions, e.g. 1.1.4, are not affected.
A new version of zlib will be released soon to address this issue. Stay tuned.
I would recommend to subscribe to the zlib announcements mailing list, just in case:
http://zlib.net/mailman/listinfo/zlib-announce_madler.net
I have also found an interesting page which describes how to identify program binaries which include statically linked copies of zlib:
http://www.enyo.de/fw/security/zlib-fingerprint/
Cheers
Last edited: