[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <284CCCC9-2C88-11D9-8661-000A95820F30@alumni.caltech.edu>
Date: Mon, 1 Nov 2004 20:32:08 -0800
From: Mark Adler <madler@...mni.caltech.edu>
To: vulnwatch@...nwatch.org, bugtraq@...urityfocus.com,
NTBUGTRAQ@...TSERV.NTBUGTRAQ.COM
Subject: zlib 1.2.2 released
(List moderators -- in the previous version of this email I sent you, I
forgot to include a link to the vulnerability, corrected below.)
Security guardians,
zlib 1.2.2 has been released, which remedies a vulnerability to a
denial-of-service attack ( http://www.kb.cert.org/vuls/id/238678 ).
You can get the latest release here:
http://www.zlib.net/
Note that the "canonical" zlib site at http://www.zlib.org/ has yet to
be updated by the owner, Jean-loup Gailly, and still shows zlib 1.2.1.
You should go to the above site for the latest release. My gpg
signature on the zlib-1.2.2.tar.gz is attached below.
Mark Adler
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (Darwin)
iD8DBQBBYMGieD/Njli8r7oRAvHKAJ9zK6T7xrX/1pNSYAHWlyW4JRgC8gCg8omS
1EgmRUAJmthccZ3/ot8ceB0=
=1fnD
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists