Bug 2116639 (CVE-2022-37434)
Summary: | CVE-2022-37434 zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sandipan Roy <saroy> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | anstephe, avibelli, bdettelb, bgeorges, caswilli, chazlett, clement.escoffier, code, csutherl, dandread, databases-maint, dffrench, dhalasz, dkreling, dkuc, drieden, erik-fedora, fedora, fjansen, gsmet, gzaronik, hamadhan, hhorak, hobbes1069, ikanias, jaromir.capik, jary, jburrell, jchaloup, jclere, jkoehler, jmartisk, jwong, jwon, kaycoth, kshier, kwalker, ljavorsk, lthon, luhliari, marcandre.lureau, max.andersen, mcascell, mdean, mmuzila, mosmerov, mruprich, mturk, ngough, odubaj, olubyans, panovotn, peholase, pgallagh, pjindal, pkubat, plodge, praiskup, probinso, psegedy, rfreire, rgodfrey, rh-spice-bugs, rjones, rravi, rruss, rsvoboda, sausingh, sbiarozk, sdouglas, ssorce, stcannon, sthirugn, szappis, tfister, tkasparek, tohughes, tqvarnst, tsasak, virt-maint, vkrizan, vkumar, vmugicag, zmiklank |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A security vulnerability was found in zlib. The flaw triggered a heap-based buffer in inflate in the inflate.c function via a large gzip header extra field. This flaw is only applicable in the call inflateGetHeader.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-12-10 19:03:05 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2116653, 2116655, 2116656, 2116657, 2116658, 2116659, 2116660, 2116661, 2116662, 2116663, 2116665, 2116666, 2116668, 2116669, 2116670, 2116671, 2116672, 2116673, 2137305, 2165084 | ||
Bug Blocks: | 2115987 |
Description
Sandipan Roy
2022-08-09 06:16:04 UTC
Created BackupPC-XS tracking bugs for this issue: Affects: epel-7 [bug 2116653] Affects: epel-8 [bug 2116655] Affects: fedora-35 [bug 2116656] Affects: fedora-36 [bug 2116660] Created mingw-zlib tracking bugs for this issue: Affects: fedora-35 [bug 2116657] Affects: fedora-36 [bug 2116661] Created rsync tracking bugs for this issue: Affects: fedora-35 [bug 2116658] Affects: fedora-36 [bug 2116662] Created zlib tracking bugs for this issue: Affects: fedora-35 [bug 2116659] Affects: fedora-36 [bug 2116663] BackupPC upstream issue: https://github.com/backuppc/backuppc/issues/478 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:7106 https://access.redhat.com/errata/RHSA-2022:7106 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:7314 https://access.redhat.com/errata/RHSA-2022:7314 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:7793 https://access.redhat.com/errata/RHSA-2022:7793 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:8291 https://access.redhat.com/errata/RHSA-2022:8291 This issue has been addressed in the following products: Red Hat JBoss Core Services Via RHSA-2022:8841 https://access.redhat.com/errata/RHSA-2022:8841 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-37434 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2023:1095 https://access.redhat.com/errata/RHSA-2023:1095 The needinfo request[s] on this closed bug have been removed as they have been unresolved for 120 days This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:0254 https://access.redhat.com/errata/RHSA-2024:0254 |