The OpenSSH currently checks for zlib version 1.2.1.2 or up. But a buffer overflow vulnerability exists in 1.2.x series versions 1.2.2 and below, the fix is available in zlib version 1.2.3.
Created attachment 943 [details] Patch to make configure to exit on vulnerable Zlib version The attached patch against current snapshot makes the configure script to exit on vulnerable Zlib version. Please let me know if there are any comments.
Thanks, but it's a couple of days late :-) From ChangeLog: 20050725 - (dtucker) [configure.ac] Update zlib version check for CAN-2005-2096.
Change all RESOLVED bug to CLOSED with the exception of the ones fixed post-4.4.