Bump zlib submodule to 1.3.2#259
Conversation
|
Thanks! It's interesting that this fails CI so hard, I haven't seen this before. Maybe you can try to re-push this as empty commit, trigger CI, and validate that it is green on |
|
I suspect the issue is that 1.3.2 added code (e.g. madler/zlib@5c47755) that checks input pointers for On the platforms where the build of The strange thing is that the checks log for the 1.3.2 commit shows that the CI passed on some of the platforms that are failing here. |
|
The strange thing is that the checks log for the 1.3.2 commit shows that the CI passed on some of the platforms that are failing here! This might hint at something we can do in the build script maybe. |
Reviewed-by: Sebastian Thiel <sebastian.thiel@icloud.com>
|
Some defines have been removed to make this work. And while CI is happy, could this have side-effects? Also, are there other or more common solutions to do this? |
|
I've opened an issue with the Ideally |
FWIW, this did not effect |
|
Thanks a lot for chiming in @tbeu! Indeed, I think this PR makes no sense on the grounds of fixing a vulnerability. However, it might have an impact improving Zlib's downstream compatibility, let's see what comes out of it. If they decline it, I think we need to go forward with this change to support zlib in this and future versions. Meanwhile, I put it back into draft until it's clear what to do. |
Apologies @tbeu. That appears to be the wrong CVE number. CVE-2026-27171 claims to affect zlib 1.3.1 and below. As a result, Mend / Whitesource, is flagging zlib-sys which uses zlib 1.3.1 in our code as vulnerable. The issue is a loop that become an infinite loop for some inputs (madler/zlib#904).
|
|
Ok, I had it researched and it seems we should just merge this. CVE-2026-27171 / GHSA-h858-mf2m-8jf4 says zlib before 1.3.2 can hit unbounded CPU consumption in crc32_combine64 and crc32_combine_gen64 when given a negative length. GitHub marks it low severity and unreviewed, and upstream fixed it in commit ba829a4 with exp For libz-sys specifically:
So the precise answer is:
Practical nuance: this is a narrow issue. It requires calling the combine API with an invalid negative length, which upstream originally described as caller misuse, not a normal decompression path. So I would treat it as a real but low-severity issue, not a That leaves my recommendation unchanged: merge PR 259 after correcting the PR description to reference CVE-2026-27171, not the earlier mistaken CVE. |
|
For me to be able to create a new release, I'd need someone who isn't me to bump the crate version in a separate PR. |

The current version of
zlibis vulnerable to https://nvd.nist.gov/vuln/detail/CVE-2026-27171Requesting a bump to 1.3.2, I've seen no issues building with it
EDIT: Corrected CVE to CVE-2026-27171,