ID

VAR-202203-1690


CVE

CVE-2018-25032


TITLE

Red Hat Security Advisory 2022-5924-01

Trust: 0.1

sources: PACKETSTORM: 168011

DESCRIPTION

zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches. Summary: An update is now available for Service Telemetry Framework 1.4 for RHEL 8. Description: Service Telemetry Framework (STF) provides automated collection of measurements and data from remote clients, such as Red Hat OpenStack Platform or third-party nodes. Bugs fixed (https://bugzilla.redhat.com/): 2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read 5. Bugs fixed (https://bugzilla.redhat.com/): 2016290 - [Warm] Warm Migration Fails and reporting ambiguous status. 2033346 - [cnv-4.10] Add vm name label to virt-launcher pods 2037605 - Openshift Virtualization alert 50% of the hyperconverged-cluster-operator-metrics/hyperconverged-cluster-operator-metrics targets in openshift-cnv namespace have been unreachable for more than 15 minutes on port 8686 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter 2074384 - SAP HANA template - template should be moved to https://github.com/RHsyseng/cnv-supplemental-templates 2080453 - [4.10.z] cluster-network-addons-operator deployment's MULTUS_IMAGE is pointing to brew image 2080918 - Upgrade CNV from 4.10.1 to 4.11 should be blocked if CNV k8s-nmstate is still installed 2083594 - virtctl guestfs incorrectly assumes image name 2085459 - smartclone-controller not started and cloned DataVolumes stuck in SnapshotForSmartCloneInProgress 2086114 - HCO is taking more than 12 minutes to reconcile consolequickstart connect-ext-net-to-vm and customize-a-boot-source 2086541 - NMO CSV dependency to CNV is failing 2088476 - [4.10.z] VMSnapshot restore fails to provision volume with size mismatch error 2088622 - 4.10.2 containers 2089637 - CNAO is blocking upgrade to 4.11 despite standalone nmstate operator is installed 2089658 - SSP Reconcile logging improvement when CR resources are changed 2089661 - [CNV-4.10] HCO Being Unable to Reconcile State 5. Security Fix(es): * argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2096278 - CVE-2022-31035 argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI 2096282 - CVE-2022-31034 argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. 2096283 - CVE-2022-31016 argocd: vulnerable to an uncontrolled memory consumption bug 2096291 - CVE-2022-31036 argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access 5. Description: Release of RHACS 3.69.2 Security Fix(es): * stackrox: Improper sanitization allows users to retrieve Notifier secrets from GraphQL API in plaintext (CVE-2022-1902) 3. Solution: If you are using the RHACS 3.69.1, you are advised to upgrade to patch release 3.69.2. Bugs fixed (https://bugzilla.redhat.com/): 2090957 - CVE-2022-1902 stackrox: Improper sanitization allows users to retrieve Notifier secrets from GraphQL API in plaintext 5. JIRA issues fixed (https://issues.jboss.org/): ROX-11455 - Release RHACS 3.69.1 ROX-9657 - Patch supported RHACS images previous to 3.69.0 release to fix RHSA-2022:0658 6. Bugs fixed (https://bugzilla.redhat.com/): 2080850 - CVE-2022-25647 com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson 2088748 - CVE-2022-28948 golang-gopkg-yaml: crash when attempting to deserialize invalid input 5. Bugs fixed (https://bugzilla.redhat.com/): 2004133 - CVE-2021-37136 netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data 2004135 - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way 2031958 - CVE-2021-43797 netty: control chars in header names may lead to HTTP request smuggling 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter 5. JIRA issues fixed (https://issues.jboss.org/): LOG-2437 - EO shouldn't grant cluster-wide permission to system:serviceaccount:openshift-monitoring:prometheus-k8s when ES cluster is deployed. [openshift-logging 5.4] LOG-2442 - Log file metric exporter not working with /var/log/pods LOG-2448 - Audit and journald logs cannot be viewed from LokiStack, when logs are forwarded with Vector as collector. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHSA-2022:2280 Space precludes documenting all of the container images in this advisory. Solution: For OpenShift Container Platform 3.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/3.11/upgrading/index.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2076211 - CVE-2022-1677 openshift/router: route hijacking attack via crafted HAProxy configuration file 2086938 - Placeholder bug for OCP 3.11.z image release 5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: security update for rh-sso-7/sso75-openshift-rhel8 container image Advisory ID: RHSA-2022:1713-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2022:1713 Issue date: 2022-05-04 CVE Names: CVE-2018-25032 CVE-2022-1154 CVE-2022-1245 CVE-2022-1271 CVE-2022-21426 CVE-2022-21434 CVE-2022-21443 CVE-2022-21476 CVE-2022-21496 ==================================================================== 1. Summary: Security updated rh-sso-7/sso75-openshift-rhel8 container image is now available for RHEL-8 based Middleware Containers. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: The rh-sso-7/sso75-openshift-rhel8 container image has been updated for RHEL-8 based Middleware Containers to include the following security issues. Security Fix(es): * keycloak: Privilege escalation vulnerability on Token Exchange (CVE-2022-1245) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Users of rh-sso-7/sso75-openshift-rhel8 container images are advised to upgrade to these updated images, which contain backported patches to correct these security issues, fix these bugs and add these enhancements. Users of these images are also encouraged to rebuild all container images that depend on these images. You can find images updated by this advisory in Red Hat Container Catalog (see References). 3. Solution: The RHEL-8 based Middleware Containers container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References). Dockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally. 4. Bugs fixed (https://bugzilla.redhat.com/): 2071036 - CVE-2022-1245 keycloak: Privilege escalation vulnerability on Token Exchange 5. References: https://access.redhat.com/security/cve/CVE-2018-25032 https://access.redhat.com/security/cve/CVE-2022-1154 https://access.redhat.com/security/cve/CVE-2022-1245 https://access.redhat.com/security/cve/CVE-2022-1271 https://access.redhat.com/security/cve/CVE-2022-21426 https://access.redhat.com/security/cve/CVE-2022-21434 https://access.redhat.com/security/cve/CVE-2022-21443 https://access.redhat.com/security/cve/CVE-2022-21476 https://access.redhat.com/security/cve/CVE-2022-21496 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/security/cve/cve-2022-1245 https://access.redhat.com/containers/?tab=images#/registry.access.redhat.com/rh-sso-7/sso75-openshift-rhel8 https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.5/html/release_notes/index 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYnL7XdzjgjWX9erEAQjfJA/5Ad18mlBZpbopQ52tgIVratvkE92jHUbN 8CFkLR1PO53voCMLen5U1SEtuy40WQXR1ttzuiVNNi+GYKCPX2SKij86OXWbgaYS JRVmpSmPCwRwmxi+JyrWZU2+zYfRPqCMgH7XOwpVZaKbyuu+p6sFRb508ECMdFq7 FBDuK1RlfT3Hh/LdLit8xP7O80SU8iy6SfAVn74B10AL8WEnVDg+pnPJ2qSmeLH9 2zDzq2Vcpd0EZTb3MdGSUtPShwJ/MW/Uw84FToa+OWnfZz2VGMhaOEo4zZSLrevH bQJRccF7kHiHiBeqYqwiohEwFv3W94M5Cn2xJZXB6/rFejrD8Fz1hBEbxrwF/Knc lw8EIZTPoQo3TDwQnLYwMHz/c6a3sTPV9dHuXqmvaDDx0TDxI1SIAdY0E/AyP2zF hSYks5MREEAjxwqHlUnUqYfTbz9HkXjlLijEktm3gzwCBb/ZdOWmb165PzzcZYSA ra2/kr2oXDSkQ3vc+witL2WvR6GgflrL1ogPBSEVAXqk+4hH4JZNm1u9YKXAwgm3 1knWLkVsFnKw/kifSkGMZE/X5v8K2uK8KjwQvart8J/Kh2AgVuM1IuJAq+kBZuhf TAeBBSvotkGQuzG76aFtfRKeiI1KP5g8P0aVd5ST4SVGncY495RY5WsdTnHxbowV FnYVhu8AIpk=psbs -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 1.71

sources: NVD: CVE-2018-25032 // VULHUB: VHN-418557 // PACKETSTORM: 168011 // PACKETSTORM: 167470 // PACKETSTORM: 167594 // PACKETSTORM: 167591 // PACKETSTORM: 167461 // PACKETSTORM: 167142 // PACKETSTORM: 167327 // PACKETSTORM: 166967

AFFECTED PRODUCTS

vendor:netappmodel:h500sscope:eqversion: -

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.8.4

Trust: 1.0

vendor:siemensmodel:scalance sc626-2cscope:ltversion:3.0

Trust: 1.0

vendor:applemodel:macosscope:gteversion:11.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:gteversion:11.0.0

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.6.9

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.6.0

Trust: 1.0

vendor:netappmodel:h410sscope:eqversion: -

Trust: 1.0

vendor:zlibmodel:zlibscope:gteversion:1.2.2.2

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.7.5

Trust: 1.0

vendor:netappmodel:hci compute nodescope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:applemodel:mac os xscope:gteversion:10.15

Trust: 1.0

vendor:netappmodel:management services for element softwarescope:eqversion: -

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:6.45

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:3.10.5

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:15.38

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.9.2

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.3.36

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:3.7.0

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:3.10.0

Trust: 1.0

vendor:netappmodel:h410cscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:scalance sc632-2cscope:ltversion:3.0

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:7.52

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:13.46

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.5.0

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:3.9.0

Trust: 1.0

vendor:applemodel:macosscope:gteversion:12.0.0

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:3.7.14

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.4.26

Trust: 1.0

vendor:siemensmodel:scalance sc622-2cscope:ltversion:3.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.7

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.5.17

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:36

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:3.8.0

Trust: 1.0

vendor:siemensmodel:scalance sc636-2cscope:ltversion:3.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.7.0

Trust: 1.0

vendor:siemensmodel:scalance sc642-2cscope:ltversion:3.0

Trust: 1.0

vendor:zlibmodel:zlibscope:ltversion:1.2.12

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:8.60

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:lteversion:11.70.2

Trust: 1.0

vendor:netappmodel:h700sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h300sscope:eqversion: -

Trust: 1.0

vendor:applemodel:macosscope:ltversion:12.4

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:3.8.14

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.9.0

Trust: 1.0

vendor:gotomodel:gotoassistscope:ltversion:11.9.18

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.4.0

Trust: 1.0

vendor:netappmodel:ontap select deploy administration utilityscope:eqversion: -

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:11.54

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.6.6

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:netappmodel:oncommand workflow automationscope:eqversion: -

Trust: 1.0

vendor:nokogirimodel:nokogiriscope:ltversion:1.13.4

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.8.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

vendor:siemensmodel:scalance sc646-2cscope:ltversion:3.0

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.15.7

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.3.0

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:17.32

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:3.9.13

Trust: 1.0

sources: NVD: CVE-2018-25032

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-25032
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2018-25032
value: HIGH

Trust: 1.0

VULHUB: VHN-418557
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-25032
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-418557
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-25032
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

sources: VULHUB: VHN-418557 // NVD: CVE-2018-25032 // NVD: CVE-2018-25032

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

sources: VULHUB: VHN-418557 // NVD: CVE-2018-25032

THREAT TYPE

remote

Trust: 0.1

sources: PACKETSTORM: 168011

TYPE

xss

Trust: 0.1

sources: PACKETSTORM: 167594

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-418557

EXTERNAL IDS

db:NVDid:CVE-2018-25032

Trust: 1.9

db:OPENWALLid:OSS-SECURITY/2022/03/28/3

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2022/03/26/1

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2022/03/28/1

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2022/03/24/1

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2022/03/25/2

Trust: 1.1

db:SIEMENSid:SSA-333517

Trust: 1.1

db:PACKETSTORMid:166967

Trust: 0.2

db:PACKETSTORMid:167327

Trust: 0.2

db:PACKETSTORMid:167142

Trust: 0.2

db:PACKETSTORMid:167594

Trust: 0.2

db:PACKETSTORMid:167461

Trust: 0.2

db:PACKETSTORMid:167591

Trust: 0.2

db:PACKETSTORMid:168011

Trust: 0.2

db:PACKETSTORMid:167470

Trust: 0.2

db:PACKETSTORMid:166552

Trust: 0.1

db:PACKETSTORMid:167133

Trust: 0.1

db:PACKETSTORMid:168352

Trust: 0.1

db:PACKETSTORMid:168042

Trust: 0.1

db:PACKETSTORMid:167391

Trust: 0.1

db:PACKETSTORMid:167381

Trust: 0.1

db:PACKETSTORMid:167122

Trust: 0.1

db:PACKETSTORMid:167400

Trust: 0.1

db:PACKETSTORMid:167956

Trust: 0.1

db:PACKETSTORMid:167088

Trust: 0.1

db:PACKETSTORMid:167346

Trust: 0.1

db:PACKETSTORMid:171157

Trust: 0.1

db:PACKETSTORMid:167225

Trust: 0.1

db:PACKETSTORMid:169897

Trust: 0.1

db:PACKETSTORMid:167140

Trust: 0.1

db:PACKETSTORMid:168696

Trust: 0.1

db:PACKETSTORMid:167008

Trust: 0.1

db:PACKETSTORMid:167602

Trust: 0.1

db:PACKETSTORMid:167277

Trust: 0.1

db:PACKETSTORMid:167330

Trust: 0.1

db:PACKETSTORMid:169782

Trust: 0.1

db:PACKETSTORMid:167485

Trust: 0.1

db:PACKETSTORMid:166946

Trust: 0.1

db:PACKETSTORMid:167679

Trust: 0.1

db:PACKETSTORMid:167334

Trust: 0.1

db:PACKETSTORMid:167116

Trust: 0.1

db:PACKETSTORMid:167389

Trust: 0.1

db:PACKETSTORMid:166563

Trust: 0.1

db:PACKETSTORMid:166555

Trust: 0.1

db:PACKETSTORMid:167223

Trust: 0.1

db:PACKETSTORMid:170003

Trust: 0.1

db:PACKETSTORMid:167555

Trust: 0.1

db:PACKETSTORMid:168036

Trust: 0.1

db:PACKETSTORMid:167224

Trust: 0.1

db:PACKETSTORMid:167568

Trust: 0.1

db:PACKETSTORMid:167260

Trust: 0.1

db:PACKETSTORMid:167134

Trust: 0.1

db:PACKETSTORMid:167364

Trust: 0.1

db:PACKETSTORMid:171152

Trust: 0.1

db:PACKETSTORMid:167188

Trust: 0.1

db:PACKETSTORMid:167271

Trust: 0.1

db:PACKETSTORMid:167936

Trust: 0.1

db:PACKETSTORMid:167138

Trust: 0.1

db:PACKETSTORMid:167189

Trust: 0.1

db:PACKETSTORMid:167586

Trust: 0.1

db:PACKETSTORMid:167186

Trust: 0.1

db:PACKETSTORMid:167281

Trust: 0.1

db:PACKETSTORMid:169624

Trust: 0.1

db:PACKETSTORMid:167265

Trust: 0.1

db:PACKETSTORMid:166970

Trust: 0.1

db:PACKETSTORMid:168392

Trust: 0.1

db:PACKETSTORMid:167119

Trust: 0.1

db:PACKETSTORMid:167136

Trust: 0.1

db:PACKETSTORMid:167674

Trust: 0.1

db:PACKETSTORMid:167622

Trust: 0.1

db:PACKETSTORMid:167124

Trust: 0.1

db:PACKETSTORMid:167486

Trust: 0.1

db:VULHUBid:VHN-418557

Trust: 0.1

sources: VULHUB: VHN-418557 // PACKETSTORM: 168011 // PACKETSTORM: 167470 // PACKETSTORM: 167594 // PACKETSTORM: 167591 // PACKETSTORM: 167461 // PACKETSTORM: 167142 // PACKETSTORM: 167327 // PACKETSTORM: 166967 // NVD: CVE-2018-25032

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20220729-0004/

Trust: 1.1

url:https://github.com/madler/zlib/compare/v1.2.11...v1.2.12

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20220526-0009/

Trust: 1.1

url:https://support.apple.com/kb/ht213255

Trust: 1.1

url:https://support.apple.com/kb/ht213256

Trust: 1.1

url:https://support.apple.com/kb/ht213257

Trust: 1.1

url:https://www.debian.org/security/2022/dsa-5111

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/may/38

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/may/35

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/may/33

Trust: 1.1

url:https://security.gentoo.org/glsa/202210-42

Trust: 1.1

url:https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531

Trust: 1.1

url:https://github.com/madler/zlib/issues/605

Trust: 1.1

url:https://www.openwall.com/lists/oss-security/2022/03/24/1

Trust: 1.1

url:https://www.openwall.com/lists/oss-security/2022/03/28/1

Trust: 1.1

url:https://www.openwall.com/lists/oss-security/2022/03/28/3

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpujul2022.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2022/03/25/2

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2022/03/26/1

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/xokfmsnq5d5wgmalbnbxu3ge442v74wu/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/jzzptwryqulaol3aw7rzjnvz2uonxcv4/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/df62mvmh3qugmbdcb3dy2erq6ebhtadb/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/dczfijbjtz7cl5qxbfktq22q26vinruf/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/voknp2l734ael47nrygvzikefoubqy5y/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ns2d2gfpfgojul4wq3duay7hf4vwq77f/

Trust: 1.0

url:https://access.redhat.com/security/team/contact/

Trust: 0.8

url:https://bugzilla.redhat.com/):

Trust: 0.8

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-25032

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2018-25032

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2022-1271

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-1271

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-21698

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-21698

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-1154

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-1154

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-21426

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-21443

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-21476

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-21496

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-21496

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-21434

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-21443

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-21434

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-21426

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-21476

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-0778

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://issues.jboss.org/):

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3634

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3737

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3737

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3634

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-4189

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-4189

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1245

Trust: 0.2

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/voknp2l734ael47nrygvzikefoubqy5y/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/jzzptwryqulaol3aw7rzjnvz2uonxcv4/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ns2d2gfpfgojul4wq3duay7hf4vwq77f/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/df62mvmh3qugmbdcb3dy2erq6ebhtadb/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/dczfijbjtz7cl5qxbfktq22q26vinruf/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/xokfmsnq5d5wgmalbnbxu3ge442v74wu/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3867

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9805

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3894

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3899

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-30761

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8743

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-14502

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8743

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8823

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-10228

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000858

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3900

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9894

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33938

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27618

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8782

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-10228

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8771

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9952

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8846

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24407

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9915

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8783

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8625

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3326

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8813

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9806

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3885

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9802

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20305

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8764

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22946

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8769

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8710

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000858

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10018

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9895

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8811

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8710

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-14502

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15358

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8819

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3862

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13050

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3868

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29361

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-9169

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3895

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3865

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3518

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33930

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14391

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3864

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9862

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3541

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33929

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29362

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8835

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14889

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8816

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8927

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3897

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8808

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13627

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3520

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20454

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8625

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-27218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22947

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8766

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11793

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9803

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3521

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9850

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-25013

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3537

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-30666

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3517

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33928

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30631

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8820

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9893

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23852

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14889

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1730

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8844

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3516

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3902

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5924

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8814

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13434

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8812

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-25013

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8815

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9843

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20454

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3901

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8720

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-30762

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13050

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13627

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29363

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9925

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15503

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8720

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5026

Trust: 0.1

url:https://github.com/rhsyseng/cnv-supplemental-templates

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-31036

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-31034

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5187

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-31035

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-31034

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-31016

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-31035

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-31016

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-31036

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5188

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-23222

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-23222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3672

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-25219

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1902

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3672

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1902

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-25219

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-28948

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25647

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28948

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25647

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:4985

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-43797

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37137

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43797

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25636

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25636

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37137

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4028

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37136

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0778

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4028

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37136

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:2216

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29046

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29599

Trust: 0.1

url:https://docs.openshift.com/container-platform/3.11/release_notes/ocp-3-11-release-notes.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29046

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29599

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1677

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:2281

Trust: 0.1

url:https://docs.openshift.com/container-platform/3.11/upgrading/index.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1677

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:2280

Trust: 0.1

url:https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29036

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29036

Trust: 0.1

url:https://access.redhat.com/containers/?tab=images#/registry.access.redhat.com/rh-sso-7/sso75-openshift-rhel8

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1245

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.5/html/release_notes/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1713

Trust: 0.1

sources: VULHUB: VHN-418557 // PACKETSTORM: 168011 // PACKETSTORM: 167470 // PACKETSTORM: 167594 // PACKETSTORM: 167591 // PACKETSTORM: 167461 // PACKETSTORM: 167142 // PACKETSTORM: 167327 // PACKETSTORM: 166967 // NVD: CVE-2018-25032

CREDITS

Red Hat

Trust: 0.8

sources: PACKETSTORM: 168011 // PACKETSTORM: 167470 // PACKETSTORM: 167594 // PACKETSTORM: 167591 // PACKETSTORM: 167461 // PACKETSTORM: 167142 // PACKETSTORM: 167327 // PACKETSTORM: 166967

SOURCES

db:VULHUBid:VHN-418557
db:PACKETSTORMid:168011
db:PACKETSTORMid:167470
db:PACKETSTORMid:167594
db:PACKETSTORMid:167591
db:PACKETSTORMid:167461
db:PACKETSTORMid:167142
db:PACKETSTORMid:167327
db:PACKETSTORMid:166967
db:NVDid:CVE-2018-25032

LAST UPDATE DATE

2026-04-18T22:02:12.514000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-418557date:2023-02-11T00:00:00
db:NVDid:CVE-2018-25032date:2025-08-21T20:37:11.840

SOURCES RELEASE DATE

db:VULHUBid:VHN-418557date:2022-03-25T00:00:00
db:PACKETSTORMid:168011date:2022-08-09T14:36:05
db:PACKETSTORMid:167470date:2022-06-19T16:19:44
db:PACKETSTORMid:167594date:2022-06-27T16:44:20
db:PACKETSTORMid:167591date:2022-06-27T16:41:09
db:PACKETSTORMid:167461date:2022-06-10T14:16:15
db:PACKETSTORMid:167142date:2022-05-12T15:55:09
db:PACKETSTORMid:167327date:2022-05-31T17:24:16
db:PACKETSTORMid:166967date:2022-05-05T17:31:42
db:NVDid:CVE-2018-25032date:2022-03-25T09:15:08.187