Evgeny Legerov reported a heap-based buffer overflow vulnerability in the inflate operation in zlib, which could result in denial of service or potentially the execution of arbitrary code if specially crafted input is processed. For the stable distribution (bullseye), this problem has been fixed in version 1:1.2.11.dfsg-2+deb11u2. We recommend that you upgrade your zlib packages. For the detailed security status of zlib please refer to its security tracker page at: https://security-tracker.debian.org/tracker/zlib
Evgeny Legerov reported a heap-based buffer overflow vulnerability in the inflate operation in zlib, which could result in denial of service or potentially the execution of arbitrary code if specially crafted input is processed.
For the stable distribution (bullseye), this problem has been fixed in version 1:1.2.11.dfsg-2+deb11u2.
We recommend that you upgrade your zlib packages.
For the detailed security status of zlib please refer to its security tracker page at: https://security-tracker.debian.org/tracker/zlib