[UBUNTU 20.04] zlib: inflate() does not update strm.adler if DFLTCC is used
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Ubuntu on IBM z Systems |
In Progress
|
Medium
|
Skipper Bug Screeners | ||
zlib (Ubuntu) |
In Progress
|
High
|
Unassigned | ||
Focal |
Triaged
|
Undecided
|
Unassigned | ||
Jammy |
Triaged
|
Undecided
|
Unassigned | ||
Kinetic |
Won't Fix
|
High
|
Unassigned |
Bug Description
SRU Justification:
------------------
[ Impact ]
* The zlib function inflate() does not update strm.adler
in case DFLTCC is used.
* This issue was exposed by Java Certification Kit (JCK) running on z15
hardware and newer and impacts all JDK versions (8,11,17, etc.)
that use the system default settings.
* The JCK failure impacts the ability to certify Java SDKs on this
platform/
* On top the incorrect alder32 result may cause functional issues with
Java applications that depend on the result.
[ Test Plan ]
* An affected Ubuntu release (20.04, 22.04 and 22.10) installed
on a z15/LinuxONE III or newer system is needed.
* Then it's possible to test the updated package with the help
of a small test program (in C) that makes use of the zlib1g library
or run the Java Certification Kit.
* Test will be done by IBM.
[ Where problems could occur ]
* The patch is a one-line change:
https:/
and there are not many issues to expect.
* There could be a potential problem with the adler field
in the strm struct.
For example in case the struct is not as assumed or contains
and unexpected value, which would then ripple through
the other fields, too.
* Structural changes could be identified with a test build that was done
for all affected Ubuntu releases and for all major architectures:
https:/
[ Other Info ]
* The patch itself is the same for all zlib version in
20.04, 22.04 and 22.10 - no further adjustments were needed.
* This bug (LP#1990379) is solved in combination with LP#1982583,
so that only one package update is needed.
However, this bug affects Kinetic, jammy and Focal,
but LP#1982583 only Jammy and Kinetic.
* The debdiffs for Kinetic and Jammy should be taken from LP#1982583,
and the remaining debdiff for Focal from here.
__________
== Comment: #0 - Ilya Leoshkevich <email address hidden> - 2022-09-21 05:02:24 ==
inflate() does not update strm.adler if DFLTCC is used.
Found with a JDK test.
zlib-ng PR: https:/
Updated zlib PR: https:/
zlib tag: https:/
Ubuntu 20.04 and later need to be fixed.
---
External link: https:/
tags: | added: architecture-s3903164 bugnameltc-200024 severity-medium targetmilestone-inin2004 |
Changed in ubuntu: | |
assignee: | nobody → Skipper Bug Screeners (skipper-screen-team) |
affects: | ubuntu → linux (Ubuntu) |
affects: | linux (Ubuntu) → zlib (Ubuntu) |
Changed in ubuntu-z-systems: | |
assignee: | nobody → Skipper Bug Screeners (skipper-screen-team) |
importance: | Undecided → Medium |
Changed in zlib (Ubuntu): | |
assignee: | Skipper Bug Screeners (skipper-screen-team) → nobody |
tags: | added: foundation-triage-discuss |
description: | updated |
Changed in zlib (Ubuntu): | |
status: | New → In Progress |
Changed in ubuntu-z-systems: | |
status: | New → In Progress |
description: | updated |
tags: | added: pei-28 |
Changed in zlib (Ubuntu Focal): | |
status: | New → In Progress |
Changed in zlib (Ubuntu Jammy): | |
status: | New → In Progress |
Changed in zlib (Ubuntu Kinetic): | |
importance: | Medium → High |
summary: |
- [UBUNTU 20.04] zlib: inflate() does not update strm.adler if DFLTCC is - used + [FFe][UBUNTU 20.04] zlib: inflate() does not update strm.adler if DFLTCC + is used |
description: | updated |
summary: |
- [FFe][UBUNTU 20.04] zlib: inflate() does not update strm.adler if DFLTCC - is used + [UBUNTU 20.04] zlib: inflate() does not update strm.adler if DFLTCC is + used |
Thanks for reporting this, Ilya. /wiki.ubuntu. com/StableRelea seUpdates) is generally in order to fix high-impact bugs.
Can you please elaborate about the potential impact of this issue - that 'inflate() does not update strm.adler if DFLTCC is used'?
Especially because this is marked with severity medium, but the Ubuntu stable release update process (SRUs: https:/
With updating stable releases (like in this case 20.04 and 22.04) there is huge carefulness needed, and especially with updating key packages and libraries like zlib, since zlib has significant package reverse dependencies and a huge amount of reverse build dependencies (both in the thousands).
Furthermore a potential update will impact multi-millions of installations, cross architecture, and we won't do that for a non-critical bugs, that maybe even only impact a small number of installations.
However, there might be a little chance to piggy-back a fix like this with a more severe zlib update that might come up in future.