{"schema_version":"1.7.2","id":"OESA-2022-1843","modified":"2022-08-19T11:04:09Z","published":"2022-08-19T11:04:09Z","upstream":["CVE-2022-37434"],"summary":"zlib security update","details":"Zlib is a free, general-purpose, not covered by any patents, lossless data-compression library for use on virtually any computer hardware and operating system. The zlib data format is itself portable across platforms.\r\n\r\nSecurity Fix(es):\r\n\r\nzlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).(CVE-2022-37434)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"zlib","purl":"pkg:rpm/openEuler/zlib\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.11-20.oe1"}]}],"ecosystem_specific":{"aarch64":["zlib-1.2.11-20.oe1.aarch64.rpm","zlib-debugsource-1.2.11-20.oe1.aarch64.rpm","minizip-1.2.11-20.oe1.aarch64.rpm","zlib-devel-1.2.11-20.oe1.aarch64.rpm","minizip-devel-1.2.11-20.oe1.aarch64.rpm","zlib-debuginfo-1.2.11-20.oe1.aarch64.rpm"],"noarch":["zlib-help-1.2.11-20.oe1.noarch.rpm"],"src":["zlib-1.2.11-20.oe1.src.rpm"],"x86_64":["zlib-devel-1.2.11-20.oe1.x86_64.rpm","zlib-debuginfo-1.2.11-20.oe1.x86_64.rpm","minizip-devel-1.2.11-20.oe1.x86_64.rpm","minizip-1.2.11-20.oe1.x86_64.rpm","zlib-debugsource-1.2.11-20.oe1.x86_64.rpm","zlib-1.2.11-20.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"zlib","purl":"pkg:rpm/openEuler/zlib\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.11-21.oe1"}]}],"ecosystem_specific":{"aarch64":["zlib-debuginfo-1.2.11-21.oe1.aarch64.rpm","minizip-1.2.11-21.oe1.aarch64.rpm","zlib-debugsource-1.2.11-21.oe1.aarch64.rpm","minizip-devel-1.2.11-21.oe1.aarch64.rpm","zlib-devel-1.2.11-21.oe1.aarch64.rpm","zlib-1.2.11-21.oe1.aarch64.rpm"],"noarch":["zlib-help-1.2.11-21.oe1.noarch.rpm"],"src":["zlib-1.2.11-21.oe1.src.rpm"],"x86_64":["zlib-devel-1.2.11-21.oe1.x86_64.rpm","zlib-debugsource-1.2.11-21.oe1.x86_64.rpm","zlib-debuginfo-1.2.11-21.oe1.x86_64.rpm","minizip-devel-1.2.11-21.oe1.x86_64.rpm","zlib-1.2.11-21.oe1.x86_64.rpm","minizip-1.2.11-21.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS","name":"zlib","purl":"pkg:rpm/openEuler/zlib\u0026distro=openEuler-22.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.11-22.oe2203"}]}],"ecosystem_specific":{"aarch64":["zlib-devel-1.2.11-22.oe2203.aarch64.rpm","minizip-1.2.11-22.oe2203.aarch64.rpm","zlib-debuginfo-1.2.11-22.oe2203.aarch64.rpm","zlib-1.2.11-22.oe2203.aarch64.rpm","minizip-devel-1.2.11-22.oe2203.aarch64.rpm","zlib-debugsource-1.2.11-22.oe2203.aarch64.rpm"],"noarch":["zlib-help-1.2.11-22.oe2203.noarch.rpm"],"src":["zlib-1.2.11-22.oe2203.src.rpm"],"x86_64":["zlib-debugsource-1.2.11-22.oe2203.x86_64.rpm","zlib-1.2.11-22.oe2203.x86_64.rpm","zlib-debuginfo-1.2.11-22.oe2203.x86_64.rpm","minizip-devel-1.2.11-22.oe2203.x86_64.rpm","zlib-devel-1.2.11-22.oe2203.x86_64.rpm","minizip-1.2.11-22.oe2203.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1843"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-37434"}],"database_specific":{"severity":"Critical"}}