diff options
author | Petr Štetiar <ynezz@true.cz> | 2022-08-06 14:55:07 +0200 |
---|---|---|
committer | Petr Štetiar <ynezz@true.cz> | 2022-08-08 09:46:36 +0200 |
commit | 7561eab8e86e1bfe8fda941439a99d4fb22a5928 (patch) | |
tree | 58d9edb1021effcd122b4d75868328e6aa680f94 /tools/lzma | |
parent | 1f9d60314162249a4ace2e22e9d820bece75de85 (diff) | |
download | upstream-7561eab8e86e1bfe8fda941439a99d4fb22a5928.tar.gz upstream-7561eab8e86e1bfe8fda941439a99d4fb22a5928.tar.bz2 upstream-7561eab8e86e1bfe8fda941439a99d4fb22a5928.zip |
zlib: backport fix for heap-based buffer over-read (CVE-2022-37434)
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow
in inflate in inflate.c via a large gzip header extra field. NOTE: only
applications that call inflateGetHeader are affected. Some common
applications bundle the affected zlib source code but may be unable to
call inflateGetHeader.
Fixes: CVE-2022-37434
References: https://github.com/ivd38/zlib_overflow
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit 7df6795d4c25447683fd4b4a4813bebcddaea547)
Diffstat (limited to 'tools/lzma')
0 files changed, 0 insertions, 0 deletions