diff options
author | Petr Štetiar <ynezz@true.cz> | 2022-03-24 06:45:04 +0100 |
---|---|---|
committer | Petr Štetiar <ynezz@true.cz> | 2022-03-24 09:40:12 +0100 |
commit | f65edc9b990c2bcc10c9e9fca29253adc6fe316d (patch) | |
tree | ef0dbf410300605169e9e6d9ea36c4a4a4dd9869 /tools/mtools | |
parent | fdd862f9acb629624207ed7a41ab82624a5ef77f (diff) | |
download | upstream-f65edc9b990c2bcc10c9e9fca29253adc6fe316d.tar.gz upstream-f65edc9b990c2bcc10c9e9fca29253adc6fe316d.tar.bz2 upstream-f65edc9b990c2bcc10c9e9fca29253adc6fe316d.zip |
zlib: backport security fix for a reproducible crash in compressor
Tavis has just reported, that he was recently trying to track down a
reproducible crash in a compressor. Believe it or not, it really was a
bug in zlib-1.2.11 when compressing (not decompressing!) certain inputs.
Tavis has reported it upstream, but it turns out the issue has been
public since 2018, but the patch never made it into a release. As far as
he knows, nobody ever assigned it a CVE.
Suggested-by: Tavis Ormandy <taviso@gmail.com>
References: https://www.openwall.com/lists/oss-security/2022/03/24/1
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit b3aa2909a79aeff20d594160b207a89dc807c033)
(cherry picked from commit 3965dda0fa70dc9408f1a2e55a3ddefde78bd50e)
Diffstat (limited to 'tools/mtools')
0 files changed, 0 insertions, 0 deletions