zlib is designed to be a free, general-purpose, legally unencumbered, lossless data-compression library for use on virtually any computer hardware and operating system. The zlib data format is itself portable across platforms. Unlike the LZW compression method used in Unix compress(1), the compression method currently used in zlib essentially never expands the data. (LZW can double or triple the file size in extreme cases.) zlib's memory footprint is also independent of the input data and can be reduced, if necessary, at some cost in compression.
|Tags||Software Development Libraries Archiving Compression|
|Operating Systems||OS Independent|
Release Notes: Many portability improvements have been made. A bug in gzclose_w() when gzwrite() failed to allocate memory has been fixed. Support for "x" (O_EXCL) and "e" (O_CLOEXEC) modes has been added to gzopen(). A type mismatch between get_crc_table() and crc_table has been fixed. Many other changes have been made.
Release Notes: Many minor bugfixes and enhancements were made.
Release Notes: Bugs were fixed in adler32_combine(), compressBound(), and deflateBound(). The gz functions were replaced with faster versions and gzbuffer(), gzoffset(), gzclose_r(), and gzclose_w() functions were added. Faster Z_HUFFMAN_ONLY and Z_RLE compression was introduced for images and other specialized compression. A Z_BLOCK flush option was added to deflate() along with a Z_TREES flush option for inflate(). inflateReset2() and inflateMark() functions were added, the latter to aid in random access applications. Many portability improvements were made. Examples and contribs were updated.
Release Notes: A potential security vulnerability when decoding invalid compressed data was eliminated. A potential security vulnerability when decoding specially crafted compressed data was eliminated. A bug when decompressing dynamic blocks with no distance codes was fixed. A CRC check bug in gzread() after gzungetc() was fixed. An error is no longer returned when using gzread() on an empty file.
Release Notes: This release eliminates a potential security vulnerability in 1.2.1, so all users of 1.2.1 should upgrade immediately. It eliminates a potential security vulnerability when decoding invalid compressed data, fixes a bug when decompressing dynamic blocks with no distance codes, and does not return an error when using gzread() on an empty file.