lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1506272A-2C4F-11D9-8661-000A95820F30@alumni.caltech.edu> Date: Mon, 1 Nov 2004 13:43:35 -0800 From: Mark Adler <madler@...mni.caltech.edu> To: vulnwatch@...nwatch.org, bugtraq@...urityfocus.com, NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM Subject: zlib 1.2.2 released Security guardians, zlib 1.2.2 has been released, which remedies a vulnerability to a denial-of-service attack ( ). You can get the latest release here: http://www.zlib.net/ Note that the "canonical" zlib site at http://www.zlib.org/ has yet to be updated by the owner, Jean-loup Gailly, and still shows zlib 1.2.1. You should go to the above site for the latest release. My gpg signature on the zlib-1.2.2.tar.gz is attached below. Mark Adler -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (Darwin) iD8DBQBBYMGieD/Njli8r7oRAvHKAJ9zK6T7xrX/1pNSYAHWlyW4JRgC8gCg8omS 1EgmRUAJmthccZ3/ot8ceB0= =1fnD -----END PGP SIGNATURE-----
Powered by blists - more mailing lists