[37201] in bugtraq
zlib 1.2.2 released
daemon@ATHENA.MIT.EDU (Mark Adler)
Tue Nov 2 15:19:38 2004
In-Reply-To: <1506272A-2C4F-11D9-8661-000A95820F30@alumni.caltech.edu>
Mime-Version: 1.0 (Apple Message framework v619)
Content-Type: text/plain; charset=US-ASCII; format=flowed
Message-Id: <284CCCC9-2C88-11D9-8661-000A95820F30@alumni.caltech.edu>
Content-Transfer-Encoding: 7bit
From: Mark Adler <madler@alumni.caltech.edu>
Date: Mon, 1 Nov 2004 20:32:08 -0800
To: vulnwatch@vulnwatch.org, bugtraq@securityfocus.com,
NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
(List moderators -- in the previous version of this email I sent you, I
forgot to include a link to the vulnerability, corrected below.)
Security guardians,
zlib 1.2.2 has been released, which remedies a vulnerability to a
denial-of-service attack ( http://www.kb.cert.org/vuls/id/238678 ).
You can get the latest release here:
http://www.zlib.net/
Note that the "canonical" zlib site at http://www.zlib.org/ has yet to
be updated by the owner, Jean-loup Gailly, and still shows zlib 1.2.1.
You should go to the above site for the latest release. My gpg
signature on the zlib-1.2.2.tar.gz is attached below.
Mark Adler
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (Darwin)
iD8DBQBBYMGieD/Njli8r7oRAvHKAJ9zK6T7xrX/1pNSYAHWlyW4JRgC8gCg8omS
1EgmRUAJmthccZ3/ot8ceB0=
=1fnD
-----END PGP SIGNATURE-----