FYI
Appended is an anouncement of a security problem in zlib, that was posted to
BugTraq today.
People using the 'official' zlib1.dll (as my own zlib-based stuff does) will
find an updated dll at the site mentioned (which I haven't tested yet). People
using differently packaged versions of zlib would be well advised (at least if
they are not in control of the input to zlib) to check with whoever supplied
the version they are using.
BTW, its a 'denial of service' attack -- i.e. its possible to crash an
application using zlib -- not a remote execution attack.
-- chris
===================================
Security guardians,
zlib 1.2.2 has been released, which remedies a vulnerability to a
denial-of-service attack (
http://www.kb.cert.org/vuls/id/238678 ).
You can get the latest release here:
http://www.zlib.net/Note that the "canonical" zlib site at
http://www.zlib.org/ has yet to
be updated by the owner, Jean-loup Gailly, and still shows zlib 1.2.1.
You should go to the above site for the latest release. My gpg
signature on the zlib-1.2.2.tar.gz is attached below.
Mark Adler
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (Darwin)
iD8DBQBBYMGieD/Njli8r7oRAvHKAJ9zK6T7xrX/1pNSYAHWlyW4JRgC8gCg8omS
1EgmRUAJmthccZ3/ot8ceB0=
=1fnD
-----END PGP SIGNATURE-----