diff options
author | Petr Štetiar <ynezz@true.cz> | 2022-08-06 14:55:07 +0200 |
---|---|---|
committer | Petr Štetiar <ynezz@true.cz> | 2022-08-08 10:00:39 +0200 |
commit | 5f189f2f333b25aec20bbf4cc9d5d8ca488ec895 (patch) | |
tree | debd15f91206c510d2c392ff80ff006591131b80 /package/libs/zlib/patches/007-fix-null-dereference-in-fix-CVE-2022-37434.patch | |
parent | f94b30d83c2aa401b3ff9c4914bb2ef6386df8aa (diff) | |
download | upstream-5f189f2f333b25aec20bbf4cc9d5d8ca488ec895.tar.gz upstream-5f189f2f333b25aec20bbf4cc9d5d8ca488ec895.tar.bz2 upstream-5f189f2f333b25aec20bbf4cc9d5d8ca488ec895.zip |
zlib: backport fix for heap-based buffer over-read (CVE-2022-37434)
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow
in inflate in inflate.c via a large gzip header extra field. NOTE: only
applications that call inflateGetHeader are affected. Some common
applications bundle the affected zlib source code but may be unable to
call inflateGetHeader.
Fixes: CVE-2022-37434
References: https://github.com/ivd38/zlib_overflow
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit 7df6795d4c25447683fd4b4a4813bebcddaea547)
Diffstat (limited to 'package/libs/zlib/patches/007-fix-null-dereference-in-fix-CVE-2022-37434.patch')
0 files changed, 0 insertions, 0 deletions