Investigate vulnerability: CVE-2022-37434 in zlib1g-1:1.2.11.dfsg-2+deb11u1
Issue created from vulnerability 53629775
Description:
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
- Severity: critical
- Confidence: unknown
Solution:
Upgrade zlib1g to 1:1.2.11.dfsg-2+deb11u2
Identifiers:
Links:
- http://www.openwall.com/lists/oss-security/2022/08/05/2
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434
- https://github.com/ivd38/zlib_overflow
- https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063
- https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
- https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764
- https://github.com/curl/curl/issues/9271
- http://www.openwall.com/lists/oss-security/2022/08/09/1
- https://access.redhat.com/security/cve/CVE-2022-37434
- https://nvd.nist.gov/vuln/detail/CVE-2022-37434
- https://ubuntu.com/security/notices/USN-5570-1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/
- https://ubuntu.com/security/notices/USN-5573-1
- https://www.debian.org/security/2022/dsa-5218
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/
- https://security.netapp.com/advisory/ntap-20220901-0005/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/
Scanner:
- Name: Trivy