Out-of-bounds Write Affecting zlib package, versions <1.2.13-r1


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.34% (71st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-ZLIB-5846706
  • published21 Aug 2023
  • disclosed5 Aug 2022

Introduced: 5 Aug 2022

CVE-2022-37434  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

Upgrade Chainguard zlib to version 1.2.13-r1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream zlib package and not the zlib package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).

References

CVSS Scores

version 3.1