[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-003 --- zlib

ID: oval:org.secpod.oval:def:19500045Date: (C)2023-06-12   (M)2024-04-17
Class: PATCHFamily: unix




An out-of-bounds access flaw was found in zlib, which allows memory corruption when deflating if the input has many distant matches. For some rare inputs with a large number of distant matches , the buffer into which the compressed or deflated data is written can overwrite the distance symbol table which it overlays. This issue results in corrupted output due to invalid distances, which leads to out-of-bound access, corrupting the memory and potentially crashing the application. A security vulnerability was found in zlib. The flaw triggered a heap-based buffer in inflate in the inflate.c function via a large gzip header extra field. This flaw is only applicable in the call inflateGetHeader

Platform:
Amazon Linux 2023
Product:
zlib
minizip-compat
Reference:
ALAS2023-2023-003
CVE-2018-25032
CVE-2022-37434
CVE    2
CVE-2018-25032
CVE-2022-37434
CPE    1
cpe:/a:zlib:zlib

© SecPod Technologies