USN-5570-1: zlib vulnerability
17 August 2022
zlib could be made to crash or run programs if it received specially crafted input.
Releases
Packages
- zlib - Lossless data-compression library
Details
Evgeny Legerov discovered that zlib incorrectly handled memory when
performing certain inflate operations. An attacker could use this issue
to cause zlib to crash, resulting in a denial of service, or possibly
execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
lib64z1
-
1:1.2.11.dfsg-0ubuntu2.2
-
libx32z1
-
1:1.2.11.dfsg-0ubuntu2.2
-
lib32z1
-
1:1.2.11.dfsg-0ubuntu2.2
-
zlib1g
-
1:1.2.11.dfsg-0ubuntu2.2
Ubuntu 16.04
-
lib64z1
-
1:1.2.8.dfsg-2ubuntu4.3+esm2
Available with Ubuntu Pro
-
libx32z1
-
1:1.2.8.dfsg-2ubuntu4.3+esm2
Available with Ubuntu Pro
-
lib32z1
-
1:1.2.8.dfsg-2ubuntu4.3+esm2
Available with Ubuntu Pro
-
zlib1g
-
1:1.2.8.dfsg-2ubuntu4.3+esm2
Available with Ubuntu Pro
Ubuntu 14.04
-
lib64z1
-
1:1.2.8.dfsg-1ubuntu1.1+esm2
Available with Ubuntu Pro
-
libx32z1
-
1:1.2.8.dfsg-1ubuntu1.1+esm2
Available with Ubuntu Pro
-
zlib-bin
-
1:1.2.8.dfsg-1ubuntu1.1+esm2
Available with Ubuntu Pro
-
lib32z1
-
1:1.2.8.dfsg-1ubuntu1.1+esm2
Available with Ubuntu Pro
-
zlib1g
-
1:1.2.8.dfsg-1ubuntu1.1+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5573-1: rsync
- USN-5570-2: zlib, lib32z1-dev, lib64z1-dev, libx32z1-dev, lib64z1, zlib1g-dev, zlib1g, lib32z1, libx32z1
- USN-6736-1: libklibc, klibc, libklibc-dev, klibc-utils
- USN-6736-2: libklibc, klibc, libklibc-dev, klibc-utils