Your submission was sent successfully! Close

USN-5355-2: zlib vulnerability

30 March 2022

zlib could be made to crash or run programs if it received specially crafted input.



  • zlib - compression library - 32 bit runtime


USN-5355-1 fixed a vulnerability in zlib. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

Danilo Ramos discovered that zlib incorrectly handled memory when
performing certain deflating operations. An attacker could use this issue
to cause zlib to crash, resulting in a denial of service, or possibly
execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04
Ubuntu 14.04

After a standard system update you need to reboot your computer to make
all the necessary changes.


Related notices

  • USN-5355-1: lib64z1-dev, lib64z1, lib32z1, lib32z1-dev, zlib1g, zlib, libx32z1-dev, zlib1g-dev, libx32z1
  • USN-5359-1: rsync
  • USN-5359-2: rsync
  • USN-5739-1: libmariadbd-dev, libmariadbd19, mariadb-client-core-10.3, mariadb-client, mariadb-server-core-10.6, mariadb-plugin-s3, mariadb-10.3, mariadb-plugin-rocksdb, mariadb-client-10.6, mariadb-10.6, mariadb-server-10.3, mariadb-server, mariadb-test, mariadb-client-10.3, mariadb-test-data, mariadb-plugin-gssapi-client, mariadb-plugin-gssapi-server, libmariadbclient-dev, mariadb-plugin-tokudb, mariadb-plugin-mroonga, mariadb-plugin-cracklib-password-check, libmariadb3, libmariadb-dev-compat, mariadb-server-core-10.3, libmariadb-dev, mariadb-backup, mariadb-plugin-spider, mariadb-common, mariadb-plugin-oqgraph, mariadb-plugin-connect, mariadb-server-10.6, mariadb-client-core-10.6