ID

VAR-202208-0404


CVE

CVE-2022-37434


TITLE

zlib  Out-of-bounds write vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-004335

DESCRIPTION

zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference). zlib Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: zlib security update Advisory ID: RHSA-2023:1095-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:1095 Issue date: 2023-03-07 CVE Names: CVE-2022-37434 ==================================================================== 1. Summary: An update for zlib is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux Client (v. 7): Source: zlib-1.2.7-21.el7_9.src.rpm x86_64: zlib-1.2.7-21.el7_9.i686.rpm zlib-1.2.7-21.el7_9.x86_64.rpm zlib-debuginfo-1.2.7-21.el7_9.i686.rpm zlib-debuginfo-1.2.7-21.el7_9.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: minizip-1.2.7-21.el7_9.i686.rpm minizip-1.2.7-21.el7_9.x86_64.rpm minizip-devel-1.2.7-21.el7_9.i686.rpm minizip-devel-1.2.7-21.el7_9.x86_64.rpm zlib-debuginfo-1.2.7-21.el7_9.i686.rpm zlib-debuginfo-1.2.7-21.el7_9.x86_64.rpm zlib-devel-1.2.7-21.el7_9.i686.rpm zlib-devel-1.2.7-21.el7_9.x86_64.rpm zlib-static-1.2.7-21.el7_9.i686.rpm zlib-static-1.2.7-21.el7_9.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: zlib-1.2.7-21.el7_9.src.rpm x86_64: zlib-1.2.7-21.el7_9.i686.rpm zlib-1.2.7-21.el7_9.x86_64.rpm zlib-debuginfo-1.2.7-21.el7_9.i686.rpm zlib-debuginfo-1.2.7-21.el7_9.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: minizip-1.2.7-21.el7_9.i686.rpm minizip-1.2.7-21.el7_9.x86_64.rpm minizip-devel-1.2.7-21.el7_9.i686.rpm minizip-devel-1.2.7-21.el7_9.x86_64.rpm zlib-debuginfo-1.2.7-21.el7_9.i686.rpm zlib-debuginfo-1.2.7-21.el7_9.x86_64.rpm zlib-devel-1.2.7-21.el7_9.i686.rpm zlib-devel-1.2.7-21.el7_9.x86_64.rpm zlib-static-1.2.7-21.el7_9.i686.rpm zlib-static-1.2.7-21.el7_9.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: zlib-1.2.7-21.el7_9.src.rpm ppc64: zlib-1.2.7-21.el7_9.ppc.rpm zlib-1.2.7-21.el7_9.ppc64.rpm zlib-debuginfo-1.2.7-21.el7_9.ppc.rpm zlib-debuginfo-1.2.7-21.el7_9.ppc64.rpm zlib-devel-1.2.7-21.el7_9.ppc.rpm zlib-devel-1.2.7-21.el7_9.ppc64.rpm ppc64le: zlib-1.2.7-21.el7_9.ppc64le.rpm zlib-debuginfo-1.2.7-21.el7_9.ppc64le.rpm zlib-devel-1.2.7-21.el7_9.ppc64le.rpm s390x: zlib-1.2.7-21.el7_9.s390.rpm zlib-1.2.7-21.el7_9.s390x.rpm zlib-debuginfo-1.2.7-21.el7_9.s390.rpm zlib-debuginfo-1.2.7-21.el7_9.s390x.rpm zlib-devel-1.2.7-21.el7_9.s390.rpm zlib-devel-1.2.7-21.el7_9.s390x.rpm x86_64: zlib-1.2.7-21.el7_9.i686.rpm zlib-1.2.7-21.el7_9.x86_64.rpm zlib-debuginfo-1.2.7-21.el7_9.i686.rpm zlib-debuginfo-1.2.7-21.el7_9.x86_64.rpm zlib-devel-1.2.7-21.el7_9.i686.rpm zlib-devel-1.2.7-21.el7_9.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: minizip-1.2.7-21.el7_9.ppc.rpm minizip-1.2.7-21.el7_9.ppc64.rpm minizip-devel-1.2.7-21.el7_9.ppc.rpm minizip-devel-1.2.7-21.el7_9.ppc64.rpm zlib-debuginfo-1.2.7-21.el7_9.ppc.rpm zlib-debuginfo-1.2.7-21.el7_9.ppc64.rpm zlib-static-1.2.7-21.el7_9.ppc.rpm zlib-static-1.2.7-21.el7_9.ppc64.rpm ppc64le: minizip-1.2.7-21.el7_9.ppc64le.rpm minizip-devel-1.2.7-21.el7_9.ppc64le.rpm zlib-debuginfo-1.2.7-21.el7_9.ppc64le.rpm zlib-static-1.2.7-21.el7_9.ppc64le.rpm s390x: minizip-1.2.7-21.el7_9.s390.rpm minizip-1.2.7-21.el7_9.s390x.rpm minizip-devel-1.2.7-21.el7_9.s390.rpm minizip-devel-1.2.7-21.el7_9.s390x.rpm zlib-debuginfo-1.2.7-21.el7_9.s390.rpm zlib-debuginfo-1.2.7-21.el7_9.s390x.rpm zlib-static-1.2.7-21.el7_9.s390.rpm zlib-static-1.2.7-21.el7_9.s390x.rpm x86_64: minizip-1.2.7-21.el7_9.i686.rpm minizip-1.2.7-21.el7_9.x86_64.rpm minizip-devel-1.2.7-21.el7_9.i686.rpm minizip-devel-1.2.7-21.el7_9.x86_64.rpm zlib-debuginfo-1.2.7-21.el7_9.i686.rpm zlib-debuginfo-1.2.7-21.el7_9.x86_64.rpm zlib-static-1.2.7-21.el7_9.i686.rpm zlib-static-1.2.7-21.el7_9.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: zlib-1.2.7-21.el7_9.src.rpm x86_64: zlib-1.2.7-21.el7_9.i686.rpm zlib-1.2.7-21.el7_9.x86_64.rpm zlib-debuginfo-1.2.7-21.el7_9.i686.rpm zlib-debuginfo-1.2.7-21.el7_9.x86_64.rpm zlib-devel-1.2.7-21.el7_9.i686.rpm zlib-devel-1.2.7-21.el7_9.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: minizip-1.2.7-21.el7_9.i686.rpm minizip-1.2.7-21.el7_9.x86_64.rpm minizip-devel-1.2.7-21.el7_9.i686.rpm minizip-devel-1.2.7-21.el7_9.x86_64.rpm zlib-debuginfo-1.2.7-21.el7_9.i686.rpm zlib-debuginfo-1.2.7-21.el7_9.x86_64.rpm zlib-static-1.2.7-21.el7_9.i686.rpm zlib-static-1.2.7-21.el7_9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-37434 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZAcuDNzjgjWX9erEAQhBfxAAnzhxAmg+iqzHC7pYiVpoAR4rHumYqU06 6mzA0Y2UcTuzx/baoTpN2lxDJlKcJxijzXAVFDVK/FMfxeznMSl5LziNzdc07Vb0 rlNzQ0UXCaRAOVrHI4cWIi+XOLnwfFT+3ZzLGnIni6ZvdMroQCNJ2AlfLCeQwZ4M 59JZeHsYMJTg2E/sgQ9KALmCA+g+XVPmjrigoEG2DSOgXS/65t0SQ0DvMDeN8nT2 G9fWqBwDZpJcgqUTDI/5JSQ0kgENR4KLmnxbRJETHvydH+0LBlthqNSGmEWuVJYe /Uw/YoffoP3tDzITzJEk5PdN6Y53atG25haf7wLmKWmfWdd2sfNqIOWZN7iUrpGG V/pWF0kamiyrJ3CzLCr73hKWwaN3+tKyX5NlwFyKg67EwujAVS8upcGLgCCy/TDc VuvvK6JiXgz0ieqhfoUXLOw4blF30OnUWWe2WHNTmXxEagRWFDmcyau0+xCs6ZtI 0e/9w8fC8qG79T8tlfM3QbYljHeyDwYRLu8S4D00eQD/KBRTren40qhDiYMjcvtQ hAgDKEkcDR1cKDgalHCNpEWN+WWJdQbCetrAzkqinbVnjXVtNlrVQrgQrQF8RvsA 4vKUM3m4sedi7CblWgtPtUU4KiLNlq2oF03RjrVnW1FohuOJ8oRQ4pnb/5iZ9b1h huKrzrky4/I=yKEJ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description: Submariner enables direct networking between pods and services on different Kubernetes clusters that are either on-premises or in the cloud. For more information about Submariner, see the Submariner open source community website at: https://submariner.io/. Security fixes: * CVE-2022-27664 golang: net/http: handle server errors after sending GOAWAY * CVE-2022-2880 golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-41715 golang: regexp/syntax: limit memory used by parsing regexps * CVE-2022-41717 golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests Bugs addressed: * subctl diagnose firewall metrics does not work on merged kubeconfig (BZ# 2013711) * [Submariner] - Fails to increase gateway amount after deployment (BZ# 2097381) * Submariner gateway node does not get deleted with subctl cloud cleanup command (BZ# 2108634) * submariner GW pods are unable to resolve the DNS of the Broker K8s API URL (BZ# 2119362) * Submariner gateway node does not get deployed after applying ManagedClusterAddOn on Openstack (BZ# 2124219) * unable to run subctl benchmark latency, pods fail with ImagePullBackOff (BZ# 2130326) * [IBM Z] - Submariner addon unistallation doesnt work from ACM console (BZ# 2136442) * Tags on AWS security group for gateway node break cloud-controller LoadBalancer (BZ# 2139477) * RHACM - Submariner: UI support for OpenStack #19297 (ACM-1242) * Submariner OVN support (ACM-1358) * Submariner Azure Console support (ACM-1388) * ManagedClusterSet consumers migrate to v1beta2 (ACM-1614) * Submariner on disconnected ACM #22000 (ACM-1678) * Submariner gateway: Error creating AWS security group if already exists (ACM-2055) * Submariner gateway security group in AWS not deleted when uninstalling submariner (ACM-2057) * The submariner-metrics-proxy pod pulls an image with wrong naming convention (ACM-2058) * The submariner-metrics-proxy pod is not part of the Agent readiness check (ACM-2067) * Subctl 0.14.0 prints version "vsubctl" (ACM-2132) * managedclusters "local-cluster" not found and missing Submariner Broker CRD (ACM-2145) * Add support of ARO to Submariner deployment (ACM-2150) * The e2e tests execution fails for "Basic TCP connectivity" tests (ACM-2204) * Gateway error shown "diagnose all" tests (ACM-2206) * Submariner does not support cluster "kube-proxy ipvs mode"(ACM-2211) * Vsphere cluster shows Pod Security admission controller warnings (ACM-2256) * Cannot use submariner with OSP and self signed certs (ACM-2274) * Subctl diagnose tests spawn nettest image with wrong tag nameing convention (ACM-2387) * Subctl 0.14.1 prints version "devel" (ACM-2482) 3. Bugs fixed (https://bugzilla.redhat.com/): 2013711 - subctl diagnose firewall metrics does not work on merged kubeconfig 2097381 - [Submariner] - Fails to increase gateway amount after deployment 2108634 - Submariner gateway node does not get deleted with subctl cloud cleanup command 2119362 - submariner GW pods are unable to resolve the DNS of the Broker K8s API URL 2124219 - Submariner gateway node does not get deployed after applying ManagedClusterAddOn on Openstack 2124669 - CVE-2022-27664 golang: net/http: handle server errors after sending GOAWAY 2130326 - unable to run subctl benchmark latency, pods fail with ImagePullBackOff 2132868 - CVE-2022-2880 golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters 2132872 - CVE-2022-41715 golang: regexp/syntax: limit memory used by parsing regexps 2136442 - [IBM Z] - Submariner addon unistallation doesnt work from ACM console 2139477 - Tags on AWS security group for gateway node break cloud-controller LoadBalancer 2161274 - CVE-2022-41717 golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests 5. JIRA issues fixed (https://issues.jboss.org/): ACM-1614 - ManagedClusterSet consumers migrate to v1beta2 (Submariner) ACM-2055 - Submariner gateway: Error creating AWS security group if already exists ACM-2057 - [Submariner] - submariner gateway security group in aws not deleted when uninstalling submariner ACM-2058 - [Submariner] - The submariner-metrics-proxy pod pulls an image with wrong naming convention ACM-2067 - [Submariner] - The submariner-metrics-proxy pod is not part of the Agent readiness check ACM-2132 - Subctl 0.14.0 prints version "vsubctl" ACM-2145 - managedclusters "local-cluster" not found and missing Submariner Broker CRD ACM-2150 - Add support of ARO to Submariner deployment ACM-2204 - [Submariner] - e2e tests execution fails for "Basic TCP connectivity" tests ACM-2206 - [Submariner] - Gateway error shown "diagnose all" tests ACM-2211 - [Submariner] - Submariner does not support cluster "kube-proxy ipvs mode" ACM-2256 - [Submariner] - Vsphere cluster shows Pod Security admission controller warnings ACM-2274 - Cannot use submariner with OSP and self signed certs ACM-2387 - [Submariner] - subctl diagnose tests spawn nettest image with wrong tag nameing convention ACM-2482 - Subctl 0.14.1 prints version "devel" 6. Bugs fixed (https://bugzilla.redhat.com/): 2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic 2064702 - CVE-2022-27191 golang: crash in a golang.org/x/crypto/ssh server 2142799 - Release of OpenShift Serverless Serving 1.26.0 2142801 - Release of OpenShift Serverless Eventing 1.26.0 5. Bugs fixed (https://bugzilla.redhat.com/): 2134010 - CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags 5. JIRA issues fixed (https://issues.jboss.org/): LOG-2674 - Many `can't remove non-existent inotify watch for: /var/log/pods/xxxxxx` errors in logfilesmetricexporter container. LOG-3042 - Logging view plugin removes part of LogQL query LOG-3049 - [release-5.5] Resources associated with collector / fluentd keep on getting recreated LOG-3127 - The alerts are Fluentd when type=vector LOG-3138 - [release-5.5] the content of secret elasticsearch-metrics-token is recreated continually LOG-3175 - [release-5.5] Vector healthcheck fails when forwarding logs to Cloudwatch LOG-3213 - must-gather is empty for logging with CLO image LOG-3234 - [release-5.5] Loki gateway is crashing because cipher-suites are not set LOG-3251 - [release-5.5] Adding Valid Subscription Annotation 6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2022-10-27-6 Additional information for APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1 macOS Monterey 12.6.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213494. AppleMobileFileIntegrity Available for: macOS Monterey Impact: An app may be able to modify protected parts of the file system Description: This issue was addressed by removing additional entitlements. CVE-2022-42825: Mickey Jin (@patch1t) Audio Available for: macOS Monterey Impact: Parsing a maliciously crafted audio file may lead to disclosure of user information Description: The issue was addressed with improved memory handling. CVE-2022-42798: Anonymous working with Trend Micro Zero Day Initiative Entry added October 27, 2022 Kernel Available for: macOS Monterey Impact: An app may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management. CVE-2022-32944: Tim Michaud (@TimGMichaud) of Moveworks.ai Entry added October 27, 2022 Kernel Available for: macOS Monterey Impact: An app may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved locking. CVE-2022-42803: Xinru Chi of Pangu Lab, John Aakerblom (@jaakerblom) Entry added October 27, 2022 Kernel Available for: macOS Monterey Impact: An app may be able to execute arbitrary code with kernel privileges Description: A logic issue was addressed with improved checks. CVE-2022-42801: Ian Beer of Google Project Zero Entry added October 27, 2022 ppp Available for: macOS Monterey Impact: A buffer overflow may result in arbitrary code execution Description: The issue was addressed with improved bounds checks. CVE-2022-32941: an anonymous researcher Entry added October 27, 2022 Ruby Available for: macOS Monterey Impact: A remote user may be able to cause unexpected app termination or arbitrary code execution Description: A memory corruption issue was addressed by updating Ruby to version 2.6.10. CVE-2022-28739 Sandbox Available for: macOS Monterey Impact: An app with root privileges may be able to access private information Description: This issue was addressed with improved data protection. CVE-2022-32862: an anonymous researcher zlib Available for: macOS Monterey Impact: A user may be able to cause unexpected app termination or arbitrary code execution Description: This issue was addressed with improved checks. CVE-2022-37434: Evgeny Legerov CVE-2022-42800: Evgeny Legerov Entry added October 27, 2022 Additional recognition Calendar We would like to acknowledge an anonymous researcher for their assistance. macOS Monterey 12.6.1 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ All information is also posted on the Apple Security Updates web site: https://support.apple.com/en-us/HT201222. Description: Red Hat Advanced Cluster Management for Kubernetes 2.6.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/release_notes/ Security fixes: * moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129) * passport: incorrect session regeneration (CVE-2022-25896) * sanitize-html: insecure global regular expression replacement logic may lead to ReDoS (CVE-2022-25887) * terser: insecure use of regular expressions leads to ReDoS (CVE-2022-25858) * search-api: SQL injection leads to remote denial of service (CVE-2022-2238) Bug fixes: * ACM 2.6.2 images (BZ# 2126195) * Infra MachineSet Replicate Taint (BZ# 2116528) * Work agent panic when apply the manifestwork (BZ# 2120920) * unexpected difference of behavior in inform policies with lists of apiGroups for ClusterRole resources (BZ# 2130985) 3. Bugs fixed (https://bugzilla.redhat.com/): 2101669 - CVE-2022-2238 search-api: SQL injection leads to remote denial of service 2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS 2111862 - CVE-2022-25896 passport: incorrect session regeneration 2116528 - Infra MachineSet Replicate Taint 2120920 - work agent panic when apply the manifestwork 2123376 - CVE-2022-25887 sanitize-html: insecure global regular expression replacement logic may lead to ReDoS 2126277 - CVE-2022-25858 terser: insecure use of regular expressions leads to ReDoS 2130985 - unexpected difference of behaviour in inform policies with lists of apiGroups for ClusterRole ressources 5. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202210-42 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: zlib: Multiple vulnerabilities Date: October 31, 2022 Bugs: #863851, #835958 ID: 202210-42 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A buffer overflow in zlib might allow an attacker to cause remote code execution. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 sys-libs/zlib < 1.2.12-r3 >= 1.2.12-r3 Description =========== Multiple vulnerabilities have been discovered in zlib. Please review the CVE identifiers referenced below for details. Impact ====== Maliciously crafted input handled by zlib may result in remote code execution. Workaround ========== There is no known workaround at this time. Resolution ========== All zlib users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=sys-libs/zlib-1.2.12-r3" References ========== [ 1 ] CVE-2018-25032 https://nvd.nist.gov/vuln/detail/CVE-2018-25032 [ 2 ] CVE-2022-37434 https://nvd.nist.gov/vuln/detail/CVE-2022-37434 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202210-42 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. License ======= Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . ========================================================================== Ubuntu Security Notice USN-6736-1 April 16, 2024 klibc vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 23.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) - Ubuntu 16.04 LTS (Available with Ubuntu Pro) - Ubuntu 14.04 LTS (Available with Ubuntu Pro) Summary: Several security issues were fixed in klibc. Software Description: - klibc: small utilities built with klibc for early boot Details: It was discovered that zlib, vendored in klibc, incorrectly handled pointer arithmetic. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2016-9840, CVE-2016-9841) Danilo Ramos discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain deflating operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2018-25032) Evgeny Legerov discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain inflate operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2022-37434) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 23.10: klibc-utils 2.0.13-1ubuntu0.1 libklibc 2.0.13-1ubuntu0.1 Ubuntu 22.04 LTS: klibc-utils 2.0.10-4ubuntu0.1 libklibc 2.0.10-4ubuntu0.1 Ubuntu 20.04 LTS: klibc-utils 2.0.7-1ubuntu5.2 libklibc 2.0.7-1ubuntu5.2 Ubuntu 18.04 LTS (Available with Ubuntu Pro): klibc-utils 2.0.4-9ubuntu2.2+esm1 libklibc 2.0.4-9ubuntu2.2+esm1 Ubuntu 16.04 LTS (Available with Ubuntu Pro): klibc-utils 2.0.4-8ubuntu1.16.04.4+esm2 libklibc 2.0.4-8ubuntu1.16.04.4+esm2 Ubuntu 14.04 LTS (Available with Ubuntu Pro): klibc-utils 2.0.3-0ubuntu1.14.04.3+esm3 libklibc 2.0.3-0ubuntu1.14.04.3+esm3 In general, a standard system update will make all the necessary changes. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.45. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHBA-2023:4052 Space precludes documenting all of the container images in this advisory. All OpenShift Container Platform 4.11 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html 3. Solution: For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html You may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags. The sha values for the release are (For x86_64 architecture) The image digest is sha256:c6771b12bd873c0e3e5fbc7afa600d92079de6534dcb52f09cb1d22ee49608a9 (For s390x architecture) The image digest is sha256:622b5361f95d1d512ea84f363ac06155cbb9ee28e85ccaae1acd80b98b660fa8 (For ppc64le architecture) The image digest is sha256:50c131cf85dfb00f258af350a46b85eff8fb8084d3e1617520cd69b59caeaff7 (For aarch64 architecture) The image digest is sha256:9e575c4ece9caaf31acbef246ccad71959cd5bf634e7cb284b0849ddfa205ad7 All OpenShift Container Platform 4.11 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2215317 - CVE-2022-21235 github.com/Masterminds/vcs: Command Injection via argument injection 5. JIRA issues fixed (https://issues.redhat.com/): OCPBUGS-15446 - (release-4.11) gather "gateway-mode-config" config map from "openshift-network-operator" namespace OCPBUGS-15532 - visiting Configurations page returns error Cannot read properties of undefined (reading 'apiGroup') OCPBUGS-15645 - Can't use git lfs in BuildConfig git source with strategy Docker OCPBUGS-15739 - Environment cannot find Python OCPBUGS-15758 - [release-4.11] Bump Jenkins and Jenkins Agent Base image versions OCPBUGS-15942 - 9% of OKD tests failing on error: tag latest failed: Internal error occurred: registry.centos.org/dotnet/dotnet-31-centos7:latest: Get "https://registry.centos.org/v2/": dial tcp: lookup registry.centos.org on 172.30.0.10:53: no such host OCPBUGS-15966 - [4.12] MetalLB contains incorrect data Correct and incorrect MetalLB resources coexist should have correct statuses 6

Trust: 2.61

sources: NVD: CVE-2022-37434 // JVNDB: JVNDB-2022-004335 // VULHUB: VHN-428208 // VULMON: CVE-2022-37434 // PACKETSTORM: 171271 // PACKETSTORM: 170898 // PACKETSTORM: 170206 // PACKETSTORM: 169810 // PACKETSTORM: 169566 // PACKETSTORM: 169712 // PACKETSTORM: 169624 // PACKETSTORM: 178074 // PACKETSTORM: 173605

AFFECTED PRODUCTS

vendor:stormshieldmodel:network securityscope:gteversion:4.6.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:netappmodel:h300sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:hciscope:eqversion: -

Trust: 1.0

vendor:netappmodel:storagegridscope:eqversion: -

Trust: 1.0

vendor:netappmodel:oncommand workflow automationscope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:37

Trust: 1.0

vendor:zlibmodel:zlibscope:lteversion:1.2.12

Trust: 1.0

vendor:applemodel:iphone osscope:gteversion:16.0

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.7.1

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:3.7.34

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:netappmodel:management services for element softwarescope:eqversion: -

Trust: 1.0

vendor:netappmodel:h700sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:3.7.31

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:15.7.1

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:3.11.22

Trust: 1.0

vendor:netappmodel:h500sscope:eqversion: -

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:4.6.3

Trust: 1.0

vendor:applemodel:macosscope:ltversion:12.6.1

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:4.3.16

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:36

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:4.3.0

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:3.11.0

Trust: 1.0

vendor:netappmodel:hci compute nodescope:eqversion: -

Trust: 1.0

vendor:applemodel:macosscope:gteversion:11.0

Trust: 1.0

vendor:netappmodel:ontap select deploy administration utilityscope:eqversion: -

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:15.7.1

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:16.1

Trust: 1.0

vendor:applemodel:macosscope:gteversion:12.0.0

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:9.1

Trust: 1.0

vendor:zlibmodel:zlibscope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:netappmodel:management services for element softwarescope: - version: -

Trust: 0.8

vendor:netappmodel:active iq unified managerscope: - version: -

Trust: 0.8

vendor:アップルmodel:ipadosscope: - version: -

Trust: 0.8

vendor:netappmodel:ontap select deploy administration utilityscope: - version: -

Trust: 0.8

vendor:netappmodel:storagegridscope: - version: -

Trust: 0.8

vendor:日立model:日立アドバンストサーバ ha8000v シリーズscope: - version: -

Trust: 0.8

vendor:netappmodel:oncommand workflow automationscope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:netappmodel:hciscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-004335 // NVD: CVE-2022-37434

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-37434
value: CRITICAL

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-37434
value: CRITICAL

Trust: 1.0

NVD: CVE-2022-37434
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202208-2276
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2022-37434
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2022-37434
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-004335 // CNNVD: CNNVD-202208-2276 // NVD: CVE-2022-37434 // NVD: CVE-2022-37434

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-120

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-428208 // JVNDB: JVNDB-2022-004335 // NVD: CVE-2022-37434

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 169712 // PACKETSTORM: 169624 // CNNVD: CNNVD-202208-2276

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202208-2276

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-428208

PATCH

title:HT213494 Hitachi Server / Client Product Security Informationurl:https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html

Trust: 0.8

title:zlib Buffer error vulnerability fixurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=203980

Trust: 0.6

title:Debian CVElist Bug Report Logs: zlib: CVE-2022-37434url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=f5712d783fb1fc3f3fa283bb16da0e35

Trust: 0.1

title: - url:https://github.com/ivd38/zlib_overflow

Trust: 0.1

sources: VULMON: CVE-2022-37434 // JVNDB: JVNDB-2022-004335 // CNNVD: CNNVD-202208-2276

EXTERNAL IDS

db:NVDid:CVE-2022-37434

Trust: 4.3

db:OPENWALLid:OSS-SECURITY/2022/08/09/1

Trust: 2.5

db:OPENWALLid:OSS-SECURITY/2022/08/05/2

Trust: 1.8

db:PACKETSTORMid:169624

Trust: 0.8

db:JVNid:JVNVU92488108

Trust: 0.8

db:JVNid:JVNVU99602271

Trust: 0.8

db:JVNid:JVNVU95292697

Trust: 0.8

db:JVNid:JVNVU92598492

Trust: 0.8

db:ICS CERTid:ICSA-23-320-12

Trust: 0.8

db:ICS CERTid:ICSA-23-005-03

Trust: 0.8

db:ICS CERTid:ICSA-25-105-08

Trust: 0.8

db:JVNDBid:JVNDB-2022-004335

Trust: 0.8

db:PACKETSTORMid:169707

Trust: 0.7

db:PACKETSTORMid:170027

Trust: 0.7

db:PACKETSTORMid:169503

Trust: 0.7

db:PACKETSTORMid:169726

Trust: 0.7

db:PACKETSTORMid:168107

Trust: 0.7

db:PACKETSTORMid:169906

Trust: 0.7

db:PACKETSTORMid:169783

Trust: 0.7

db:PACKETSTORMid:168113

Trust: 0.7

db:PACKETSTORMid:168765

Trust: 0.7

db:PACKETSTORMid:169595

Trust: 0.7

db:AUSCERTid:ESB-2022.4108

Trust: 0.6

db:AUSCERTid:ESB-2022.6290

Trust: 0.6

db:AUSCERTid:ESB-2022.6178

Trust: 0.6

db:AUSCERTid:ESB-2023.4082

Trust: 0.6

db:AUSCERTid:ESB-2022.6434

Trust: 0.6

db:AUSCERTid:ESB-2022.5461

Trust: 0.6

db:AUSCERTid:ESB-2022.4243

Trust: 0.6

db:AUSCERTid:ESB-2022.5782

Trust: 0.6

db:AUSCERTid:ESB-2022.5304.2

Trust: 0.6

db:AUSCERTid:ESB-2023.0089

Trust: 0.6

db:AUSCERTid:ESB-2022.5544

Trust: 0.6

db:AUSCERTid:ESB-2023.3839

Trust: 0.6

db:AUSCERTid:ESB-2022.5593

Trust: 0.6

db:AUSCERTid:ESB-2022.4523

Trust: 0.6

db:AUSCERTid:ESB-2023.3143

Trust: 0.6

db:AUSCERTid:ESB-2022.6333

Trust: 0.6

db:AUSCERTid:ESB-2022.5137

Trust: 0.6

db:AUSCERTid:ESB-2022.4301

Trust: 0.6

db:AUSCERTid:ESB-2022.4139

Trust: 0.6

db:AUSCERTid:ESB-2023.1423

Trust: 0.6

db:AUSCERTid:ESB-2022.4133

Trust: 0.6

db:CNNVDid:CNNVD-202208-2276

Trust: 0.6

db:PACKETSTORMid:171271

Trust: 0.2

db:PACKETSTORMid:169566

Trust: 0.2

db:PACKETSTORMid:169557

Trust: 0.1

db:PACKETSTORMid:169577

Trust: 0.1

db:VULHUBid:VHN-428208

Trust: 0.1

db:VULMONid:CVE-2022-37434

Trust: 0.1

db:PACKETSTORMid:170898

Trust: 0.1

db:PACKETSTORMid:170206

Trust: 0.1

db:PACKETSTORMid:169810

Trust: 0.1

db:PACKETSTORMid:169712

Trust: 0.1

db:PACKETSTORMid:178074

Trust: 0.1

db:PACKETSTORMid:173605

Trust: 0.1

sources: VULHUB: VHN-428208 // VULMON: CVE-2022-37434 // PACKETSTORM: 171271 // PACKETSTORM: 170898 // PACKETSTORM: 170206 // PACKETSTORM: 169810 // PACKETSTORM: 169566 // PACKETSTORM: 169712 // PACKETSTORM: 169624 // PACKETSTORM: 178074 // PACKETSTORM: 173605 // JVNDB: JVNDB-2022-004335 // CNNVD: CNNVD-202208-2276 // NVD: CVE-2022-37434

REFERENCES

url:http://www.openwall.com/lists/oss-security/2022/08/09/1

Trust: 2.5

url:https://github.com/ivd38/zlib_overflow

Trust: 1.9

url:http://www.openwall.com/lists/oss-security/2022/08/05/2

Trust: 1.8

url:https://github.com/curl/curl/issues/9271

Trust: 1.8

url:https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#l1062-l1063

Trust: 1.8

url:https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1

Trust: 1.8

url:https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#l762-l764

Trust: 1.8

url:http://seclists.org/fulldisclosure/2022/oct/37

Trust: 1.7

url:http://seclists.org/fulldisclosure/2022/oct/38

Trust: 1.7

url:http://seclists.org/fulldisclosure/2022/oct/41

Trust: 1.7

url:http://seclists.org/fulldisclosure/2022/oct/42

Trust: 1.7

url:https://www.debian.org/security/2022/dsa-5218

Trust: 1.7

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/pavpqncg3xrlclnsqrm3kan5zfmvxvty/

Trust: 1.7

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nmboj77a7t7pqcarmduk75te6llesz3o/

Trust: 1.7

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/yrqai7h4m4rqz2iwzueexecbe5d56bh2/

Trust: 1.7

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/x5u7otkzshy2i3zfjsr2shfhw72rkgdk/

Trust: 1.7

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/jwn4ve3jqr4o2sous5txnlanrpmhwv4i/

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20220901-0005/

Trust: 1.7

url:https://support.apple.com/kb/ht213488

Trust: 1.7

url:https://support.apple.com/kb/ht213489

Trust: 1.7

url:https://support.apple.com/kb/ht213490

Trust: 1.7

url:https://support.apple.com/kb/ht213491

Trust: 1.7

url:https://support.apple.com/kb/ht213493

Trust: 1.7

url:https://support.apple.com/kb/ht213494

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20230427-0007/

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-37434

Trust: 1.2

url:https://access.redhat.com/security/cve/cve-2022-37434

Trust: 1.2

url:https://github.com/madler/zlib/commit/1eb7682f845ac9e9bf9ae35bbfb3bad5dacbd91d

Trust: 1.0

url:https://jvn.jp/vu/jvnvu99602271/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu95292697/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu92598492/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu92488108/

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-005-03

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-12

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-08

Trust: 0.8

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/yrqai7h4m4rqz2iwzueexecbe5d56bh2/

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/x5u7otkzshy2i3zfjsr2shfhw72rkgdk/

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/nmboj77a7t7pqcarmduk75te6llesz3o/

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/jwn4ve3jqr4o2sous5txnlanrpmhwv4i/

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/pavpqncg3xrlclnsqrm3kan5zfmvxvty/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4108

Trust: 0.6

url:https://vigilance.fr/vulnerability/zlib-buffer-overflow-via-inflategetheader-39003

Trust: 0.6

url:https://packetstormsecurity.com/files/168113/ubuntu-security-notice-usn-5573-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3143

Trust: 0.6

url:https://packetstormsecurity.com/files/169707/red-hat-security-advisory-2022-7314-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1423

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-37434/

Trust: 0.6

url:https://packetstormsecurity.com/files/170027/red-hat-security-advisory-2022-8634-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.6290

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3839

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5461

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.6178

Trust: 0.6

url:https://packetstormsecurity.com/files/169783/red-hat-security-advisory-2022-7793-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5782

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.6434

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4133

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5544

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.6333

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4139

Trust: 0.6

url:https://packetstormsecurity.com/files/169624/gentoo-linux-security-advisory-202210-42.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.4082

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5304.2

Trust: 0.6

url:https://packetstormsecurity.com/files/169503/red-hat-security-advisory-2022-7106-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/169726/red-hat-security-advisory-2022-7407-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.0089

Trust: 0.6

url:https://packetstormsecurity.com/files/168765/ubuntu-security-notice-usn-5570-2.html

Trust: 0.6

url:https://packetstormsecurity.com/files/169906/red-hat-security-advisory-2022-8291-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5593

Trust: 0.6

url:https://packetstormsecurity.com/files/168107/ubuntu-security-notice-usn-5570-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4243

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4301

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5137

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4523

Trust: 0.6

url:https://support.apple.com/en-us/ht213490

Trust: 0.6

url:https://packetstormsecurity.com/files/169595/apple-security-advisory-2022-10-27-12.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-35525

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-35527

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-35527

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-35525

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-2509

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-3515

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-40674

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-2509

Trust: 0.3

url:https://issues.jboss.org/):

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-22629

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-22662

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-22628

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-22629

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-30293

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-3709

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-22662

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1304

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-22624

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1304

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2016-3709

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-26716

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-26717

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-26719

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-26709

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-26700

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42012

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-22624

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-22628

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-26710

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42010

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42011

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42898

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21626

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21619

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21628

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21618

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21618

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21628

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-39399

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21624

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21626

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21624

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21619

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-29900

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1353

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1353

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0494

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-23816

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-23816

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2588

Trust: 0.2

url:https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0494

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-2588

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-29901

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-23825

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-23825

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-34903

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-25032

Trust: 0.2

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016710

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:1095

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-46848

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26700

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2601

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3775

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26710

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-40303

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26709

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-40304

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-35737

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3821

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2601

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-43680

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/add-ons/submariner#deploying-submariner-console

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-27664

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30699

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41715

Trust: 0.1

url:https://submariner.io/.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-46848

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30698

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41974

Trust: 0.1

url:https://submariner.io/getting-started/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2880

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41717

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:0631

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3787

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-27404

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.11/html/serverless/index

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#low

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:8938

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-27405

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-27406

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43565

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-43565

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-27191

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-32149

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29900

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.11/logging/cluster-logging-upgrading.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:7434

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42798

Trust: 0.1

url:https://support.apple.com/ht213494.

Trust: 0.1

url:https://support.apple.com/en-us/ht201222.

Trust: 0.1

url:https://support.apple.com/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42801

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32944

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42803

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32862

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42800

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42825

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32941

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-28739

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2238

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0391

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0391

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25887

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-20107

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2238

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-20107

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25858

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:7313

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25896

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-31129

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25887

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/release_notes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25896

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25858

Trust: 0.1

url:https://security.gentoo.org/glsa/202210-42

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/klibc/2.0.10-4ubuntu0.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6736-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9840

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/klibc/2.0.13-1ubuntu0.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/klibc/2.0.7-1ubuntu5.2

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36085

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20231

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-0215

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20838

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-31566

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-47629

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1281

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3634

Trust: 0.1

url:https://registry.centos.org/v2/":

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-31566

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:4053

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-23177

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-36084

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36086

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17595

Trust: 0.1

url:https://issues.redhat.com/):

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20232

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14155

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20838

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-18218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3580

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-32233

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1271

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17595

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-4304

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1897

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38177

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18218

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-23177

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1785

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24370

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1586

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1927

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-0361

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17594

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-38178

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20231

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36084

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24407

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21235

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36087

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-24329

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20232

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14155

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17594

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-40528

Trust: 0.1

url:https://access.redhat.com/errata/rhba-2023:4052

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29824

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-4450

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24370

Trust: 0.1

url:https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3580

Trust: 0.1

sources: VULHUB: VHN-428208 // VULMON: CVE-2022-37434 // PACKETSTORM: 171271 // PACKETSTORM: 170898 // PACKETSTORM: 170206 // PACKETSTORM: 169810 // PACKETSTORM: 169566 // PACKETSTORM: 169712 // PACKETSTORM: 169624 // PACKETSTORM: 178074 // PACKETSTORM: 173605 // JVNDB: JVNDB-2022-004335 // CNNVD: CNNVD-202208-2276 // NVD: CVE-2022-37434

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 171271 // PACKETSTORM: 170898 // PACKETSTORM: 170206 // PACKETSTORM: 169810 // PACKETSTORM: 169712 // PACKETSTORM: 173605

SOURCES

db:VULHUBid:VHN-428208
db:VULMONid:CVE-2022-37434
db:PACKETSTORMid:171271
db:PACKETSTORMid:170898
db:PACKETSTORMid:170206
db:PACKETSTORMid:169810
db:PACKETSTORMid:169566
db:PACKETSTORMid:169712
db:PACKETSTORMid:169624
db:PACKETSTORMid:178074
db:PACKETSTORMid:173605
db:JVNDBid:JVNDB-2022-004335
db:CNNVDid:CNNVD-202208-2276
db:NVDid:CVE-2022-37434

LAST UPDATE DATE

2025-08-12T23:02:43.817000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-428208date:2023-01-09T00:00:00
db:VULMONid:CVE-2022-37434date:2022-08-08T00:00:00
db:JVNDBid:JVNDB-2022-004335date:2025-04-17T08:07:00
db:CNNVDid:CNNVD-202208-2276date:2023-07-20T00:00:00
db:NVDid:CVE-2022-37434date:2025-05-30T20:15:30.030

SOURCES RELEASE DATE

db:VULHUBid:VHN-428208date:2022-08-05T00:00:00
db:VULMONid:CVE-2022-37434date:2022-08-05T00:00:00
db:PACKETSTORMid:171271date:2023-03-07T19:11:28
db:PACKETSTORMid:170898date:2023-02-08T16:00:47
db:PACKETSTORMid:170206date:2022-12-13T17:13:48
db:PACKETSTORMid:169810date:2022-11-10T13:48:32
db:PACKETSTORMid:169566date:2022-10-31T14:25:29
db:PACKETSTORMid:169712date:2022-11-03T13:04:52
db:PACKETSTORMid:169624date:2022-11-01T13:31:28
db:PACKETSTORMid:178074date:2024-04-16T14:05:51
db:PACKETSTORMid:173605date:2023-07-19T15:37:11
db:JVNDBid:JVNDB-2022-004335date:2023-04-06T00:00:00
db:CNNVDid:CNNVD-202208-2276date:2022-08-05T00:00:00
db:NVDid:CVE-2022-37434date:2022-08-05T07:15:07.240