Bug 2366317 (CVE-2025-4638)
| Summary: | CVE-2025-4638 pcl: zlib: Improper Pointer Arithmetic in pcl | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | CC: | adudiak, ahughes, caswilli, csutherl, dfreiber, drow, gotiwari, it.vidhyadharan, jburrell, jcantril, jclere, jhorak, jvasik, kaycoth, khosford, kshier, mvyas, neugens, omaciel, periklis, pjindal, plodge, rblanco, rojacob, sraghupu, stcannon, szappis, t-fedora, tpopela, vkumar, vmugicag, yguenane |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A flaw was found in the inftrees.c component of the zlib library bundled within the PointCloudLibrary (PCL). This vulnerability allows context-dependent attackers to cause undefined behavior via improper pointer arithmetic.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2366405, 2366407, 2366408, 2366411, 2366420, 2366421, 2366423, 2366425, 2366426, 2366430, 2366431, 2366432, 2366434, 2366436, 2366437, 2366406, 2366409, 2366410, 2366412, 2366413, 2366414, 2366415, 2366416, 2366417, 2366418, 2366419, 2366422, 2366424, 2366427, 2366428, 2366429, 2366433, 2366435, 2366438, 2366439 | ||
| Bug Blocks: | |||
|
Description
OSIDB Bzimport
2025-05-14 19:01:16 UTC
this is the upstream patch that fixed that: https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0 This seems to have been filed against all packages that simply bundle zlib, while the issue itself is about pcl bundling a very old zlib (1.2.8). For example, that zlib was replaced in OpenJDK in 2017: https://github.com/openjdk/jdk/commit/b284200a903f2203029288cc68d736e423910207 The issue found on registry.access.redhat.com/ubi9/openjdk-21-runtime:1.22-1.1747241886 very latest images.
{
"text": "",
"id": 46,
"severity": "high",
"cvss": 8.1,
"status": "affected",
"cve": "CVE-2025-4638",
"cause": "",
"description": "A vulnerability exists in the inftrees.c component of the zlib library, which is bundled within the PointCloudLibrary (PCL). This issue may allow context-dependent attackers to cause undefined behavior by exploiting improper pointer arithmetic...",
"title": "",
"vecStr": "",
"exploit": "",
"riskFactors": {
"Attack vector: network": true,
"DoS - High": true,
"High severity": true,
"Recent vulnerability": true
},
"link": "https://access.redhat.com/security/cve/CVE-2025-4638",
"type": "image",
"packageType": "os",
"severityCHML": "H",
"packageName": "zlib",
"packageVersion": "1.2.11-40.el9",
"packageBinaryPkgs": [
"zlib"
]
}
I also scanned the base image registry.redhat.io/rhel9-osbs/osbs-ubi9-minimal:latest
{
"text": "",
"id": 46,
"severity": "high",
"cvss": 8.1,
"status": "affected",
"cve": "CVE-2025-4638",
"cause": "",
"description": "A vulnerability exists in the inftrees.c component of the zlib library, which is bundled within the PointCloudLibrary (PCL). This issue may allow context-dependent attackers to cause undefined behavior by exploiting improper pointer arithmetic. Since version 1.14.0, PCL by default uses a zlib installation from the system, unless the user sets WITH_SYSTEM_ZLIB=FALSE. So this potential vulnerability is only relevant if the PCL version is older than 1.14.0 or the user specifically requests to not use the system zlib.",
"title": "",
"vecStr": "",
"exploit": "",
"riskFactors": {
"Attack vector: network": true,
"DoS - High": true,
"High severity": true,
"Recent vulnerability": true
},
"link": "https://access.redhat.com/security/cve/CVE-2025-4638",
"type": "image",
"packageType": "os",
"layerTime": 1745451390,
"templates": null,
"twistlock": false,
"cri": false,
"published": 1747267200,
"fixDate": 0,
"applicableRules": [
"*"
],
"discovered": "2025-05-21T08:54:55Z",
"functionLayer": "",
"wildfireMalware": {},
"secret": {},
"severityCHML": "H",
"packageName": "zlib",
"packageVersion": "1.2.11-40.el9",
"packageBinaryPkgs": [
"zlib"
],
"packagePath": "",
"packageLicense": "zlib and Boost"
}
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extended Lifecycle Support Via RHSA-2025:8314 https://access.redhat.com/errata/RHSA-2025:8314 |