ID

VAR-202203-1690


CVE

CVE-2018-25032


TITLE

Apple Security Advisory 2022-05-16-3

Trust: 0.1

sources: PACKETSTORM: 167188

DESCRIPTION

zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6 macOS Big Sur 11.6.6 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213256. apache Available for: macOS Big Sur Impact: Multiple issues in apache Description: Multiple issues were addressed by updating apache to version 2.4.53. CVE-2021-44224 CVE-2021-44790 CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 AppKit Available for: macOS Big Sur Impact: A malicious application may be able to gain root privileges Description: A logic issue was addressed with improved validation. CVE-2022-22665: Lockheed Martin Red Team AppleAVD Available for: macOS Big Sur Impact: An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited. Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2022-22675: an anonymous researcher AppleGraphicsControl Available for: macOS Big Sur Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2022-26751: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative AppleScript Available for: macOS Big Sur Impact: Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory Description: An out-of-bounds read issue was addressed with improved bounds checking. CVE-2022-26698: Qi Sun of Trend Micro AppleScript Available for: macOS Big Sur Impact: Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory Description: An out-of-bounds read issue was addressed with improved input validation. CVE-2022-26697: Qi Sun and Robert Ai of Trend Micro CoreTypes Available for: macOS Big Sur Impact: A malicious application may bypass Gatekeeper checks Description: This issue was addressed with improved checks to prevent unauthorized actions. CVE-2022-22663: Arsenii Kostromin (0x3c3e) CVMS Available for: macOS Big Sur Impact: A malicious application may be able to gain root privileges Description: A memory initialization issue was addressed. CVE-2022-26721: Yonghwi Jin (@jinmo123) of Theori CVE-2022-26722: Yonghwi Jin (@jinmo123) of Theori DriverKit Available for: macOS Big Sur Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An out-of-bounds access issue was addressed with improved bounds checking. CVE-2022-26763: Linus Henze of Pinauten GmbH (pinauten.de) Graphics Drivers Available for: macOS Big Sur Impact: A local user may be able to read kernel memory Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. CVE-2022-22674: an anonymous researcher Intel Graphics Driver Available for: macOS Big Sur Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2022-26720: Liu Long of Ant Security Light-Year Lab Intel Graphics Driver Available for: macOS Big Sur Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds read issue was addressed with improved input validation. CVE-2022-26770: Liu Long of Ant Security Light-Year Lab Intel Graphics Driver Available for: macOS Big Sur Impact: An application may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds write issue was addressed with improved input validation. CVE-2022-26756: Jack Dates of RET2 Systems, Inc Intel Graphics Driver Available for: macOS Big Sur Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2022-26769: Antonio Zekic (@antoniozekic) Intel Graphics Driver Available for: macOS Big Sur Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved input validation. CVE-2022-26748: Jeonghoon Shin of Theori working with Trend Micro Zero Day Initiative IOMobileFrameBuffer Available for: macOS Big Sur Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management. CVE-2022-26768: an anonymous researcher Kernel Available for: macOS Big Sur Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved validation. CVE-2022-26714: Peter Nguyễn Vũ Hoàng (@peternguyen14) of STAR Labs (@starlabs_sg) Kernel Available for: macOS Big Sur Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2022-26757: Ned Williamson of Google Project Zero LaunchServices Available for: macOS Big Sur Impact: A malicious application may be able to bypass Privacy preferences Description: The issue was addressed with additional permissions checks. CVE-2022-26767: Wojciech Reguła (@_r3ggi) of SecuRing LaunchServices Available for: macOS Big Sur Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: An access issue was addressed with additional sandbox restrictions on third-party applications. CVE-2022-26706: Arsenii Kostromin (0x3c3e) libresolv Available for: macOS Big Sur Impact: An attacker may be able to cause unexpected application termination or arbitrary code execution Description: This issue was addressed with improved checks. CVE-2022-26776: Zubair Ashraf of Crowdstrike, Max Shavrick (@_mxms) of the Google Security Team LibreSSL Available for: macOS Big Sur Impact: Processing a maliciously crafted certificate may lead to a denial of service Description: A denial of service issue was addressed with improved input validation. CVE-2022-0778 libxml2 Available for: macOS Big Sur Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2022-23308 OpenSSL Available for: macOS Big Sur Impact: Processing a maliciously crafted certificate may lead to a denial of service Description: This issue was addressed with improved checks. CVE-2022-0778 PackageKit Available for: macOS Big Sur Impact: A malicious application may be able to modify protected parts of the file system Description: This issue was addressed by removing the vulnerable code. CVE-2022-26712: Mickey Jin (@patch1t) Printing Available for: macOS Big Sur Impact: A malicious application may be able to bypass Privacy preferences Description: This issue was addressed by removing the vulnerable code. CVE-2022-26746: @gorelics Security Available for: macOS Big Sur Impact: A malicious app may be able to bypass signature validation Description: A certificate parsing issue was addressed with improved checks. CVE-2022-26766: Linus Henze of Pinauten GmbH (pinauten.de) SMB Available for: macOS Big Sur Impact: An application may be able to gain elevated privileges Description: An out-of-bounds read issue was addressed with improved input validation. CVE-2022-26718: Peter Nguyễn Vũ Hoàng of STAR Labs SMB Available for: macOS Big Sur Impact: Mounting a maliciously crafted Samba network share may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2022-26723: Felix Poulin-Belanger SMB Available for: macOS Big Sur Impact: An application may be able to gain elevated privileges Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2022-26715: Peter Nguyễn Vũ Hoàng of STAR Labs SoftwareUpdate Available for: macOS Big Sur Impact: A malicious application may be able to access restricted files Description: This issue was addressed with improved entitlements. CVE-2022-26728: Mickey Jin (@patch1t) TCC Available for: macOS Big Sur Impact: An app may be able to capture a user's screen Description: This issue was addressed with improved checks. CVE-2022-26726: an anonymous researcher Tcl Available for: macOS Big Sur Impact: A malicious application may be able to break out of its sandbox Description: This issue was addressed with improved environment sanitization. CVE-2022-26755: Arsenii Kostromin (0x3c3e) Vim Available for: macOS Big Sur Impact: Multiple issues in Vim Description: Multiple issues were addressed by updating Vim. CVE-2021-4136 CVE-2021-4166 CVE-2021-4173 CVE-2021-4187 CVE-2021-4192 CVE-2021-4193 CVE-2021-46059 CVE-2022-0128 WebKit Available for: macOS Big Sur Impact: Processing a maliciously crafted mail message may lead to running arbitrary javascript Description: A validation issue was addressed with improved input sanitization. CVE-2022-22589: Heige of KnownSec 404 Team (knownsec.com) and Bo Qu of Palo Alto Networks (paloaltonetworks.com) Wi-Fi Available for: macOS Big Sur Impact: A malicious application may disclose restricted memory Description: A memory corruption issue was addressed with improved validation. CVE-2022-26745: an anonymous researcher Wi-Fi Available for: macOS Big Sur Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2022-26761: Wang Yu of Cyberserval zip Available for: macOS Big Sur Impact: Processing a maliciously crafted file may lead to a denial of service Description: A denial of service issue was addressed with improved state handling. CVE-2022-0530 zlib Available for: macOS Big Sur Impact: An attacker may be able to cause unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2018-25032: Tavis Ormandy zsh Available for: macOS Big Sur Impact: A remote attacker may be able to cause arbitrary code execution Description: This issue was addressed by updating to zsh version 5.8.1. CVE-2021-45444 Additional recognition Bluetooth We would like to acknowledge Jann Horn of Project Zero for their assistance. macOS Big Sur 11.6.6 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ All information is also posted on the Apple Security Updates web site: https://support.apple.com/en-us/HT201222. This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEePiLW1MrMjw19XzoeC9qKD1prhgFAmKC1TUACgkQeC9qKD1p rhgJBg/9HpPp6P2OtFdYHigfaoga/3szMAjXC650MlC2rF1lXyTRVsO54eupz4er K8Iud3+YnDVTUKkadftWt2XdxAADGtfEFhJW584RtnWjeli+XtGEjQ8jD1/MNPJW qtnrOh2pYG9SxolKDofhiecbYxIGppRKSDRFl0/3VGFed2FIpiRDunlttHBEhHu/ vZVSFzMrNbGvhju+ZCdwFLKXOgB851aRSeo9Xkt63tSGiee7rLmVAINyFbbPwcVP yXwMvn0TNodCBn0wBWD0+iQ3UXIDIYSPaM1Z0BQxVraEhK3Owro3JKgqNbWswMvj SY0KUulbAPs3aOeyz1BI70npYA3+Qwd+bk2hxbzbU/AxvxCrsEk04QfxLYqvj0mR VZYPcup2KAAkiTeekQ5X739r8NAyaaI+bp7FllFv/Z2jVW9kGgNIFr46R05MD9NF aC1JAZtJ4VWbMEGHnHAMrOgdGaHpryvzl2BjUXRgW27vIq5uF5YiNcpjS2BezTFc R2ojiMNRB33Y44LlH7Zv3gHm4bE3+NzcGeWvBzwOsHznk9Jiv6x2eBUxkttMlPyO zymQMONQN3bktSMT8JnmJ8rlEgISONd7NeTEzuhlGIWaWNAFmmBoPnBiPk+yC3n4 d22yFs6DLp2pJ+0zOWmTcqt1xYng05Jwj4F0KT49w0TO9Up79+o= =rtPl -----END PGP SIGNATURE----- . Bugs fixed (https://bugzilla.redhat.com/): 2117872 - CVE-2022-1798 kubeVirt: Arbitrary file read on the host from KubeVirt VMs 5. Bugs fixed (https://bugzilla.redhat.com/): 2016290 - [Warm] Warm Migration Fails and reporting ambiguous status. 2033346 - [cnv-4.10] Add vm name label to virt-launcher pods 2037605 - Openshift Virtualization alert 50% of the hyperconverged-cluster-operator-metrics/hyperconverged-cluster-operator-metrics targets in openshift-cnv namespace have been unreachable for more than 15 minutes on port 8686 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter 2074384 - SAP HANA template - template should be moved to https://github.com/RHsyseng/cnv-supplemental-templates 2080453 - [4.10.z] cluster-network-addons-operator deployment's MULTUS_IMAGE is pointing to brew image 2080918 - Upgrade CNV from 4.10.1 to 4.11 should be blocked if CNV k8s-nmstate is still installed 2083594 - virtctl guestfs incorrectly assumes image name 2085459 - smartclone-controller not started and cloned DataVolumes stuck in SnapshotForSmartCloneInProgress 2086114 - HCO is taking more than 12 minutes to reconcile consolequickstart connect-ext-net-to-vm and customize-a-boot-source 2086541 - NMO CSV dependency to CNV is failing 2088476 - [4.10.z] VMSnapshot restore fails to provision volume with size mismatch error 2088622 - 4.10.2 containers 2089637 - CNAO is blocking upgrade to 4.11 despite standalone nmstate operator is installed 2089658 - SSP Reconcile logging improvement when CR resources are changed 2089661 - [CNV-4.10] HCO Being Unable to Reconcile State 5. Description: Red Hat Advanced Cluster Management for Kubernetes 2.3.11 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/ Security fixes: * node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235) * follow-redirects: Exposure of Sensitive Information via Authorization Header leak (CVE-2022-0536) * nconf: Prototype pollution in memory store (CVE-2022-21803) * golang: crypto/elliptic IsOnCurve returns true for invalid field elements (CVE-2022-23806) * Moment.js: Path traversal in moment.locale (CVE-2022-24785) * golang: syscall: faccessat checks wrong group (CVE-2022-29526) * go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses (CVE-2022-29810) Bug fixes: * RHACM 2.3.11 images (BZ# 2082087) 3. Bugs fixed (https://bugzilla.redhat.com/): 2044591 - CVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor 2053259 - CVE-2022-0536 follow-redirects: Exposure of Sensitive Information via Authorization Header leak 2053429 - CVE-2022-23806 golang: crypto/elliptic IsOnCurve returns true for invalid field elements 2072009 - CVE-2022-24785 Moment.js: Path traversal in moment.locale 2074689 - CVE-2022-21803 nconf: Prototype pollution in memory store 2080279 - CVE-2022-29810 go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses 2082087 - RHACM 2.3.11 images 2084085 - CVE-2022-29526 golang: syscall: faccessat checks wrong group 5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift Container Platform 4.9.35 bug fix and security update Advisory ID: RHSA-2022:2283-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2022:2283 Issue date: 2022-05-25 CVE Names: CVE-2018-25032 CVE-2022-1271 CVE-2022-1677 ==================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.9.35 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.35. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHBA-2022:2282 Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes: https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html Security Fix(es): * openshift/router: route hijacking attack via crafted HAProxy configuration file (CVE-2022-1677) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. You may download the oc tool and use it to inspect release image metadata as follows: (For x86_64 architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.35-x86_64 The image digest is sha256:d617e6436691f002da49503aeeba84028846c50793115ee2ab6e040eb3713ce7 (For s390x architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.35-s390x The image digest is sha256:f05ede0fa8e8323fd2cab1e163c7b626cacb3d68fa83148bfc1d703ce75cb84b (For ppc64le architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.35-ppc64le The image digest is sha256:a7e4d1af6fee3173d4c5d6f15fbbbd6040498507453a38cc782c2425281da412 All OpenShift Container Platform 4.9 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html 3. Solution: For OpenShift Container Platform 4.9 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2024491 - concurrent CRD from ovirt-csi-driver-operator gets reconciled by CVO after deployment, changing CR as well. 2046016 - SnapShot with Disk Hot-plug hangs 2048631 - missing volumes list in snapshot modal 2068084 - cluster-etcd-operator - disable defrag-controller as there is unpredictable impact on large OpenShift Container Platform 4 - Cluster 2075704 - FailedMount MountVolume.SetUp failed for volume "kube-api-access" : object "openshift-kube-scheduler"/"kube-root-ca.crt" not registered 2076211 - CVE-2022-1677 openshift/router: route hijacking attack via crafted HAProxy configuration file 2079231 - Namespace column provide wrong data in ClusterRole Details -> Rolebindings tab 2082316 - Update owners for openshift/cluster-etcd-operator 2083467 - (release-4.9) disconnected insights operator remains degraded after editing pull secret 2083482 - Avoid update races between old and new NTO operands during cluster upgrades 2088319 - Redfish set boot device failed for node in OCP 4.9 latest RC 5. References: https://access.redhat.com/security/cve/CVE-2018-25032 https://access.redhat.com/security/cve/CVE-2022-1271 https://access.redhat.com/security/cve/CVE-2022-1677 https://access.redhat.com/security/updates/classification/#moderate 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. Summary: New Cryostat 2.1.1 on RHEL 8 container images are now available 2. Description: New Cryostat 2.1.1 on RHEL 8 container images have been released, containing bug fixes and addressing the following security vulnerabilities: CVE-2022-25647, CVE-2022-28948 (see References) Users of Cryostat 2 on RHEL 8 container images are advised to upgrade to these updated images, which contain backported patches to correct these security issues and fix these bugs. Users of these images are also encouraged to rebuild all container images that depend on these images. Dockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally. Bugs fixed (https://bugzilla.redhat.com/): 2080850 - CVE-2022-25647 com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson 2088748 - CVE-2022-28948 golang-gopkg-yaml: crash when attempting to deserialize invalid input 5. Relevant releases/architectures: Red Hat CodeReady Linux Builder (v. 9) - noarch 3. Description: The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2067945 - CVE-2018-25032 zlib: A flaw found in zlib when compressing (not decompressing) certain inputs 6. Package List: Red Hat CodeReady Linux Builder (v. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Bugs fixed (https://bugzilla.redhat.com/): 2004133 - CVE-2021-37136 netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data 2004135 - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way 2031958 - CVE-2021-43797 netty: control chars in header names may lead to HTTP request smuggling 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter 5. JIRA issues fixed (https://issues.jboss.org/): LOG-2437 - EO shouldn't grant cluster-wide permission to system:serviceaccount:openshift-monitoring:prometheus-k8s when ES cluster is deployed. [openshift-logging 5.4] LOG-2442 - Log file metric exporter not working with /var/log/pods LOG-2448 - Audit and journald logs cannot be viewed from LokiStack, when logs are forwarded with Vector as collector. Bugs fixed (https://bugzilla.redhat.com/): 2081686 - CVE-2022-29165 argocd: ArgoCD will blindly trust JWT claims if anonymous access is enabled 2081689 - CVE-2022-24905 argocd: Login screen allows message spoofing if SSO is enabled 2081691 - CVE-2022-24904 argocd: Symlink following allows leaking out-of-bound manifests and JSON files from Argo CD repo-server 5

Trust: 1.89

sources: NVD: CVE-2018-25032 // VULHUB: VHN-418557 // PACKETSTORM: 167188 // PACKETSTORM: 167334 // PACKETSTORM: 168696 // PACKETSTORM: 167470 // PACKETSTORM: 167622 // PACKETSTORM: 167260 // PACKETSTORM: 167461 // PACKETSTORM: 169897 // PACKETSTORM: 167142 // PACKETSTORM: 167223

AFFECTED PRODUCTS

vendor:netappmodel:oncommand workflow automationscope:eqversion: -

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:7.52

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.15.7

Trust: 1.0

vendor:siemensmodel:scalance sc646-2cscope:ltversion:3.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.7

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:3.8.0

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.8.4

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:8.60

Trust: 1.0

vendor:netappmodel:h410cscope:eqversion: -

Trust: 1.0

vendor:nokogirimodel:nokogiriscope:ltversion:1.13.4

Trust: 1.0

vendor:netappmodel:h700sscope:eqversion: -

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.6.9

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

vendor:netappmodel:h410sscope:eqversion: -

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:3.8.14

Trust: 1.0

vendor:applemodel:macosscope:gteversion:12.0.0

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.4.0

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.5.0

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:3.10.5

Trust: 1.0

vendor:netappmodel:hci compute nodescope:eqversion: -

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:11.54

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:3.7.0

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.6.6

Trust: 1.0

vendor:siemensmodel:scalance sc626-2cscope:ltversion:3.0

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:3.9.0

Trust: 1.0

vendor:netappmodel:h500sscope:eqversion: -

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.4.26

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.8.0

Trust: 1.0

vendor:applemodel:macosscope:gteversion:11.0

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.3.36

Trust: 1.0

vendor:gotomodel:gotoassistscope:ltversion:11.9.18

Trust: 1.0

vendor:siemensmodel:scalance sc636-2cscope:ltversion:3.0

Trust: 1.0

vendor:netappmodel:ontap select deploy administration utilityscope:eqversion: -

Trust: 1.0

vendor:applemodel:mac os xscope:gteversion:10.15

Trust: 1.0

vendor:zlibmodel:zlibscope:ltversion:1.2.12

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.9.0

Trust: 1.0

vendor:siemensmodel:scalance sc632-2cscope:ltversion:3.0

Trust: 1.0

vendor:applemodel:macosscope:ltversion:12.4

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.6.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.9.2

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:13.46

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.3.0

Trust: 1.0

vendor:siemensmodel:scalance sc622-2cscope:ltversion:3.0

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:6.45

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:17.32

Trust: 1.0

vendor:siemensmodel:scalance sc642-2cscope:ltversion:3.0

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:15.38

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.7.5

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:3.7.14

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:36

Trust: 1.0

vendor:netappmodel:h300sscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:gteversion:11.0.0

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:3.9.13

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.7.0

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:lteversion:11.70.2

Trust: 1.0

vendor:netappmodel:management services for element softwarescope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.5.17

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:3.10.0

Trust: 1.0

sources: NVD: CVE-2018-25032

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-25032
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2018-25032
value: HIGH

Trust: 1.0

VULHUB: VHN-418557
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-25032
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-418557
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-25032
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

sources: VULHUB: VHN-418557 // NVD: CVE-2018-25032 // NVD: CVE-2018-25032

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

sources: VULHUB: VHN-418557 // NVD: CVE-2018-25032

TYPE

code execution

Trust: 0.1

sources: PACKETSTORM: 167188

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-418557

EXTERNAL IDS

db:NVDid:CVE-2018-25032

Trust: 2.1

db:OPENWALLid:OSS-SECURITY/2022/03/28/3

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2022/03/26/1

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2022/03/28/1

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2022/03/24/1

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2022/03/25/2

Trust: 1.1

db:SIEMENSid:SSA-333517

Trust: 1.1

db:PACKETSTORMid:167142

Trust: 0.2

db:PACKETSTORMid:169897

Trust: 0.2

db:PACKETSTORMid:168696

Trust: 0.2

db:PACKETSTORMid:167334

Trust: 0.2

db:PACKETSTORMid:167223

Trust: 0.2

db:PACKETSTORMid:167260

Trust: 0.2

db:PACKETSTORMid:167461

Trust: 0.2

db:PACKETSTORMid:167188

Trust: 0.2

db:PACKETSTORMid:167470

Trust: 0.2

db:PACKETSTORMid:167622

Trust: 0.2

db:PACKETSTORMid:166552

Trust: 0.1

db:PACKETSTORMid:167133

Trust: 0.1

db:PACKETSTORMid:168352

Trust: 0.1

db:PACKETSTORMid:168042

Trust: 0.1

db:PACKETSTORMid:166967

Trust: 0.1

db:PACKETSTORMid:167327

Trust: 0.1

db:PACKETSTORMid:167391

Trust: 0.1

db:PACKETSTORMid:167381

Trust: 0.1

db:PACKETSTORMid:167122

Trust: 0.1

db:PACKETSTORMid:167400

Trust: 0.1

db:PACKETSTORMid:167956

Trust: 0.1

db:PACKETSTORMid:167088

Trust: 0.1

db:PACKETSTORMid:167346

Trust: 0.1

db:PACKETSTORMid:171157

Trust: 0.1

db:PACKETSTORMid:167225

Trust: 0.1

db:PACKETSTORMid:167140

Trust: 0.1

db:PACKETSTORMid:167008

Trust: 0.1

db:PACKETSTORMid:167602

Trust: 0.1

db:PACKETSTORMid:167277

Trust: 0.1

db:PACKETSTORMid:167330

Trust: 0.1

db:PACKETSTORMid:169782

Trust: 0.1

db:PACKETSTORMid:167485

Trust: 0.1

db:PACKETSTORMid:166946

Trust: 0.1

db:PACKETSTORMid:167679

Trust: 0.1

db:PACKETSTORMid:167116

Trust: 0.1

db:PACKETSTORMid:167389

Trust: 0.1

db:PACKETSTORMid:166563

Trust: 0.1

db:PACKETSTORMid:166555

Trust: 0.1

db:PACKETSTORMid:170003

Trust: 0.1

db:PACKETSTORMid:167555

Trust: 0.1

db:PACKETSTORMid:168036

Trust: 0.1

db:PACKETSTORMid:167224

Trust: 0.1

db:PACKETSTORMid:167568

Trust: 0.1

db:PACKETSTORMid:167134

Trust: 0.1

db:PACKETSTORMid:167364

Trust: 0.1

db:PACKETSTORMid:167594

Trust: 0.1

db:PACKETSTORMid:171152

Trust: 0.1

db:PACKETSTORMid:167591

Trust: 0.1

db:PACKETSTORMid:168011

Trust: 0.1

db:PACKETSTORMid:167271

Trust: 0.1

db:PACKETSTORMid:167936

Trust: 0.1

db:PACKETSTORMid:167138

Trust: 0.1

db:PACKETSTORMid:167189

Trust: 0.1

db:PACKETSTORMid:167586

Trust: 0.1

db:PACKETSTORMid:167186

Trust: 0.1

db:PACKETSTORMid:167281

Trust: 0.1

db:PACKETSTORMid:169624

Trust: 0.1

db:PACKETSTORMid:167265

Trust: 0.1

db:PACKETSTORMid:166970

Trust: 0.1

db:PACKETSTORMid:168392

Trust: 0.1

db:PACKETSTORMid:167119

Trust: 0.1

db:PACKETSTORMid:167136

Trust: 0.1

db:PACKETSTORMid:167674

Trust: 0.1

db:PACKETSTORMid:167124

Trust: 0.1

db:PACKETSTORMid:167486

Trust: 0.1

db:VULHUBid:VHN-418557

Trust: 0.1

sources: VULHUB: VHN-418557 // PACKETSTORM: 167188 // PACKETSTORM: 167334 // PACKETSTORM: 168696 // PACKETSTORM: 167470 // PACKETSTORM: 167622 // PACKETSTORM: 167260 // PACKETSTORM: 167461 // PACKETSTORM: 169897 // PACKETSTORM: 167142 // PACKETSTORM: 167223 // NVD: CVE-2018-25032

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20220729-0004/

Trust: 1.1

url:https://github.com/madler/zlib/compare/v1.2.11...v1.2.12

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20220526-0009/

Trust: 1.1

url:https://support.apple.com/kb/ht213255

Trust: 1.1

url:https://support.apple.com/kb/ht213256

Trust: 1.1

url:https://support.apple.com/kb/ht213257

Trust: 1.1

url:https://www.debian.org/security/2022/dsa-5111

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/may/38

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/may/35

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/may/33

Trust: 1.1

url:https://security.gentoo.org/glsa/202210-42

Trust: 1.1

url:https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531

Trust: 1.1

url:https://github.com/madler/zlib/issues/605

Trust: 1.1

url:https://www.openwall.com/lists/oss-security/2022/03/24/1

Trust: 1.1

url:https://www.openwall.com/lists/oss-security/2022/03/28/1

Trust: 1.1

url:https://www.openwall.com/lists/oss-security/2022/03/28/3

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpujul2022.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2022/03/25/2

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2022/03/26/1

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25032

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ns2d2gfpfgojul4wq3duay7hf4vwq77f/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/voknp2l734ael47nrygvzikefoubqy5y/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/xokfmsnq5d5wgmalbnbxu3ge442v74wu/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/dczfijbjtz7cl5qxbfktq22q26vinruf/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/df62mvmh3qugmbdcb3dy2erq6ebhtadb/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/jzzptwryqulaol3aw7rzjnvz2uonxcv4/

Trust: 1.0

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.9

url:https://access.redhat.com/security/team/contact/

Trust: 0.9

url:https://bugzilla.redhat.com/):

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2018-25032

Trust: 0.9

url:https://access.redhat.com/articles/11258

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-1271

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-1271

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-3634

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-4189

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3634

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3737

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-0778

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21698

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21698

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-41617

Trust: 0.2

url:https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-4189

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3737

Trust: 0.2

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/voknp2l734ael47nrygvzikefoubqy5y/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/jzzptwryqulaol3aw7rzjnvz2uonxcv4/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ns2d2gfpfgojul4wq3duay7hf4vwq77f/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/df62mvmh3qugmbdcb3dy2erq6ebhtadb/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/dczfijbjtz7cl5qxbfktq22q26vinruf/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/xokfmsnq5d5wgmalbnbxu3ge442v74wu/

Trust: 0.1

url:https://support.apple.com/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22721

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23308

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-46059

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22589

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22663

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0128

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4187

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44790

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22674

Trust: 0.1

url:https://support.apple.com/ht213256.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0530

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44224

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26698

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22719

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4193

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26697

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4173

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4192

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4136

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-45444

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22675

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22720

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26706

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22665

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26712

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4166

Trust: 0.1

url:https://support.apple.com/en-us/ht201222.

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:4845

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0494

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1798

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29154

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29154

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2526

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2526

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23852

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0494

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6890

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1353

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1798

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1353

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23852

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5026

Trust: 0.1

url:https://github.com/rhsyseng/cnv-supplemental-templates

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3752

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4157

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3669

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3744

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0235

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1708

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html-single/install/index#installing

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13974

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-45485

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3773

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-29154

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43976

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-0941

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43389

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27820

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-44733

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0536

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21781

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3696

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4037

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-29154

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-38185

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37159

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-4788

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3772

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-0404

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3669

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3764

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20322

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43056

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3612

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28733

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-41864

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4197

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0492

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-0941

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3612

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-26401

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21803

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27820

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29526

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3743

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1011

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28736

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13974

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20322

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4083

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-45486

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3697

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0322

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-4788

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28734

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-25219

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-26401

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28737

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0286

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0001

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-25219

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3695

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28735

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24785

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23806

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3759

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5392

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29810

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21781

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/index

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0002

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4203

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-42739

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-0404

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1677

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:2283

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1677

Trust: 0.1

url:https://access.redhat.com/errata/rhba-2022:2282

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-28948

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25647

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28948

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25647

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:4985

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:8420

Trust: 0.1

url:https://issues.jboss.org/):

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-43797

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21426

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21443

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21476

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1154

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37137

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21496

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1154

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43797

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21496

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25636

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25636

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37137

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21434

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4028

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21443

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37136

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21434

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4028

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21426

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37136

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21476

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0778

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:2216

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-24904

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-24905

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24904

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:4691

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29165

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-41617

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29165

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24905

Trust: 0.1

sources: VULHUB: VHN-418557 // PACKETSTORM: 167188 // PACKETSTORM: 167334 // PACKETSTORM: 168696 // PACKETSTORM: 167470 // PACKETSTORM: 167622 // PACKETSTORM: 167260 // PACKETSTORM: 167461 // PACKETSTORM: 169897 // PACKETSTORM: 167142 // PACKETSTORM: 167223 // NVD: CVE-2018-25032

CREDITS

Red Hat

Trust: 0.9

sources: PACKETSTORM: 167334 // PACKETSTORM: 168696 // PACKETSTORM: 167470 // PACKETSTORM: 167622 // PACKETSTORM: 167260 // PACKETSTORM: 167461 // PACKETSTORM: 169897 // PACKETSTORM: 167142 // PACKETSTORM: 167223

SOURCES

db:VULHUBid:VHN-418557
db:PACKETSTORMid:167188
db:PACKETSTORMid:167334
db:PACKETSTORMid:168696
db:PACKETSTORMid:167470
db:PACKETSTORMid:167622
db:PACKETSTORMid:167260
db:PACKETSTORMid:167461
db:PACKETSTORMid:169897
db:PACKETSTORMid:167142
db:PACKETSTORMid:167223
db:NVDid:CVE-2018-25032

LAST UPDATE DATE

2025-08-12T22:41:05.150000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-418557date:2023-02-11T00:00:00
db:NVDid:CVE-2018-25032date:2025-05-06T15:15:54.753

SOURCES RELEASE DATE

db:VULHUBid:VHN-418557date:2022-03-25T00:00:00
db:PACKETSTORMid:167188date:2022-05-17T16:59:42
db:PACKETSTORMid:167334date:2022-06-01T16:53:39
db:PACKETSTORMid:168696date:2022-10-12T13:22:05
db:PACKETSTORMid:167470date:2022-06-19T16:19:44
db:PACKETSTORMid:167622date:2022-06-29T20:27:02
db:PACKETSTORMid:167260date:2022-05-25T13:29:06
db:PACKETSTORMid:167461date:2022-06-10T14:16:15
db:PACKETSTORMid:169897date:2022-11-16T16:09:49
db:PACKETSTORMid:167142date:2022-05-12T15:55:09
db:PACKETSTORMid:167223date:2022-05-19T15:52:51
db:NVDid:CVE-2018-25032date:2022-03-25T09:15:08.187