Описание
zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| zlib | unfixed | package | ||
| zlib | no-dsa | trixie | package | |
| zlib | no-dsa | bookworm | package | |
| zlib | postponed | bullseye | package |
Примечания
https://github.com/madler/zlib/issues/904
Fixed by: https://github.com/madler/zlib/commit/ba829a458576d1ff0f26fc7230c6de816d1f6a77 (v1.3.2)
EPSS
Связанные уязвимости
zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.
zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.
zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.
zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.
EPSS