[ALSA-2022:7106] Moderate: zlib security update
Type:
security
Severity:
moderate
Release date:
2022-10-26
Description:
The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Security Fix(es): * zlib: a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field (CVE-2022-37434) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 zlib-static-1.2.11-19.el8_6.aarch64.rpm 040f3083e365dce75573fb58e837d94530d488cabb9db22891a07ccf2da4df6d
aarch64 zlib-devel-1.2.11-19.el8_6.aarch64.rpm 2dce73a86c7298aae6a35fb2146b3b56a288c651850c1d395fcb621c33512252
aarch64 zlib-1.2.11-19.el8_6.aarch64.rpm f0d07493dec05ced63d1dde395117bbc80a2c7ccdaa1c8c775b763a1d9e93fab
i686 zlib-devel-1.2.11-19.el8_6.i686.rpm 13d26ef755ace9e0cf1b616ccc70e829ebfabb2ad28f5ab630f4d8cf747c500f
i686 zlib-1.2.11-19.el8_6.i686.rpm 2124b9411b237ee9b025ab63d8dfba174cf757e7c0606fe3d31c2782d318e755
i686 zlib-static-1.2.11-19.el8_6.i686.rpm ada217ae3d9cf92b1ca700203564acb319a869c750f6216bc95c63ce8cf22d53
ppc64le zlib-devel-1.2.11-19.el8_6.ppc64le.rpm 01684f71e14e1fd71ce5b9d6140cf0c40d10003bf9bf8e7594ac5882c5a5bf95
ppc64le zlib-1.2.11-19.el8_6.ppc64le.rpm 40e35ca52b23ad5e7225d327abdefadbdb92c0602ecca6f74314a6cf1d018510
ppc64le zlib-static-1.2.11-19.el8_6.ppc64le.rpm c42fb3bb4ce72490687c9eaaaf6c5d78e3be63f3f9aa1595730abc966df7d418
s390x zlib-1.2.11-19.el8_6.s390x.rpm 711d578f8975ea339e9b1da2ae2b67e76e8aef4a4546eb5e25b8f79cfac88a08
s390x zlib-devel-1.2.11-19.el8_6.s390x.rpm ac80a8849bfca92cd1f05a4c587c3d53e30508e70abde9ba2c0a62b298740979
s390x zlib-static-1.2.11-19.el8_6.s390x.rpm c80b8467260948c92091d3fa618acd58ef2016e43c16430652a986c15fc8bbe5
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.