[ALSA-2022:7314] Moderate: zlib security update
Type:
security
Severity:
moderate
Release date:
2022-11-02
Description:
The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Security Fix(es): * zlib: a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field (CVE-2022-37434) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 zlib-1.2.11-32.el9_0.aarch64.rpm 41b196857449e86b42ab793f328efe1af807585073f423a007bbbde102248c9e
aarch64 zlib-devel-1.2.11-32.el9_0.aarch64.rpm a79f20e9ce5f982949ef7bc5a0916b6e166c7c8d3893ad0d703f6c96ff9c63d9
aarch64 zlib-static-1.2.11-32.el9_0.aarch64.rpm bd022652eb8dd26837ac7bc1ea3dd7391c9cbe8029faa26f1d04777d86d379be
i686 zlib-devel-1.2.11-32.el9_0.i686.rpm 7aeb04163853e6c1212f944a2b47749d6fc187c41716c21747df46a2aaa7d0a8
i686 zlib-static-1.2.11-32.el9_0.i686.rpm c7202a1a273d793ad8db472ee0599e85af120ca68d2c4261bcd73f9324f673ba
ppc64le zlib-devel-1.2.11-32.el9_0.ppc64le.rpm 442afafb865abbd3aa64638dee158ff67c73c07e81b08a4cb17c673e5783f9d2
ppc64le zlib-1.2.11-32.el9_0.ppc64le.rpm 4fb6c411525723b41c105880730d701bbbd4860e1bcdf7a25f8c9c97f91b4092
ppc64le zlib-static-1.2.11-32.el9_0.ppc64le.rpm 6d9b9a1e911845981a22aeeda8991a19bc98d952a3f9e7105a4bd5fe8f08a4c4
s390x zlib-static-1.2.11-32.el9_0.s390x.rpm 786a1206d349e64db5f7969555f525f8e3e85b9577ca209b4694238b39b84f7c
s390x zlib-1.2.11-32.el9_0.s390x.rpm 86a49ded33cb36b31f4b962aa62cc70cd174856e9398f3a57e76aade91fc6e90
s390x zlib-devel-1.2.11-32.el9_0.s390x.rpm d66b3e3c74e1a0de970e452f2ecf2a25473bd39ec4511cecee4953dbc87f7073
x86_64 zlib-1.2.11-32.el9_0.x86_64.rpm bd4009fbe4ced90f997b79ebb8733bb6ebfbba530ea731e56a0dccd6b8c33346
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.