[noble] ftbfs with new zlib 1.3
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
openssh (Ubuntu) |
Fix Released
|
High
|
Miriam España Acebal |
Bug Description
The zlib detection code seems faulty:
checking for possibly buggy zlib... yes
configure: error: *** zlib too old - check config.log ***
Your reported zlib version has known security problems. It's possible your
vendor has fixed these problems without changing the version number. If you
are sure this is the case, you can disable the check by running
"./configure --without-
If you are in doubt, upgrade zlib to version 1.2.3 or greater.
See http://
| #include <stdio.h>
| #include <stdlib.h>
| #include <zlib.h>
|
| int
| main (void)
| {
|
| int a=0, b=0, c=0, d=0, n, v;
| n = sscanf(
| if (n != 3 && n != 4)
| exit(1);
| v = a*1000000 + b*10000 + c*100 + d;
| fprintf(stderr, "found zlib version %s (%d)\n", ZLIB_VERSION, v);
|
| /* 1.1.4 is OK */
| if (a == 1 && b == 1 && c >= 4)
| exit(0);
|
| /* 1.2.3 and up are OK */
| if (v >= 1020300)
| exit(0);
|
| exit(2);
|
| ;
| return 0;
| }
Upstream bug report: https:/
Upstream fix (untested): https:/
Related branches
- Andreas Hasenack: Approve
- git-ubuntu bot: Approve
- Canonical Server Reporter: Pending requested
-
Diff: 55 lines (+33/-0)3 files modifieddebian/changelog (+7/-0)
debian/patches/fix-ftbfs-with-zlib13.patch (+25/-0)
debian/patches/series (+1/-0)
CVE References
Changed in openssh (Ubuntu): | |
status: | New → Triaged |
description: | updated |
summary: |
- noble ftbfs with new zlib 1.3 + [noble] ftbfs with new zlib 1.3 |
tags: | added: bitesize |
Changed in openssh (Ubuntu): | |
assignee: | nobody → Miriam España Acebal (mirespace) |
Changed in openssh (Ubuntu): | |
status: | Triaged → In Progress |
Successful building with the fix as patch suggested by Andreas:
https:/ /launchpad. net/~mirespace/ +archive/ ubuntu/ openssh- lp2049552- ftbfs-with- zlib/+sourcepub /15701298/ +listing- archive- extra
Running tests...