Content-Type: |
text/plain; charset="utf-8" |
Date: |
Tue, 7 Mar 2023 17:06:40 -0000 |
Reply-To: |
|
Subject: |
|
MIME-Version: |
1.0 |
Message-ID: |
<20230307170640.10508.92041@0acbe050e934> |
Content-Transfer-Encoding: |
7bit |
Sender: |
|
From: |
|
Parts/Attachments: |
|
|
Synopsis: Moderate: zlib security update
Advisory ID: SLSA-2023:1095-1
Issue Date: 2023-03-07
CVE Numbers: CVE-2022-37434
--
Security Fix(es):
* zlib: heap-based buffer over-read and overflow in inflate() in inflate.c
via a large gzip header extra field (CVE-2022-37434)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
--
SL7
x86_64
zlib-1.2.7-21.el7_9.i686.rpm
zlib-1.2.7-21.el7_9.x86_64.rpm
zlib-debuginfo-1.2.7-21.el7_9.i686.rpm
zlib-debuginfo-1.2.7-21.el7_9.x86_64.rpm
minizip-1.2.7-21.el7_9.i686.rpm
minizip-1.2.7-21.el7_9.x86_64.rpm
minizip-devel-1.2.7-21.el7_9.i686.rpm
minizip-devel-1.2.7-21.el7_9.x86_64.rpm
zlib-devel-1.2.7-21.el7_9.i686.rpm
zlib-devel-1.2.7-21.el7_9.x86_64.rpm
zlib-static-1.2.7-21.el7_9.i686.rpm
zlib-static-1.2.7-21.el7_9.x86_64.rpm
- Scientific Linux Development Team
|
|
|