Skip to content

[zlib] Fix potential vulnerable cloned functions #18526

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

npt-1707
Copy link

Description
This PR fixes a potential vulnerability in inflate_fast() that was cloned from zlib but did not receive the security patch. The original issue was reported and fixed under madler/zlib@9aaec95.
This PR applies the same patch to eliminate the vulnerability.

References
https://nvd.nist.gov/vuln/detail/cve-2016-9841
madler/zlib@9aaec95

@npt-1707 npt-1707 requested a review from dpiparo as a code owner April 27, 2025 17:44
Copy link

github-actions bot commented Apr 28, 2025

Test Results

    18 files      18 suites   4d 9h 52m 34s ⏱️
 2 731 tests  2 725 ✅ 0 💤 6 ❌
47 713 runs  47 707 ✅ 0 💤 6 ❌

For more details on these failures, see this check.

Results for commit 2d5f135.

♻️ This comment has been updated with latest results.

@ferdymercury ferdymercury added this to the 6.36.00 milestone Apr 28, 2025
@dpiparo dpiparo requested a review from couet April 28, 2025 07:15
@ferdymercury ferdymercury changed the title Fix potential vulnerable cloned functions [zlib] Fix potential vulnerable cloned functions Apr 28, 2025
@dpiparo dpiparo assigned dpiparo and unassigned couet Apr 28, 2025
@dpiparo dpiparo requested review from pcanal and removed request for couet April 28, 2025 07:19
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants