ID

VAR-202208-0404


CVE

CVE-2022-37434


TITLE

Red Hat Security Advisory 2023-0795-01

Trust: 0.1

sources: PACKETSTORM: 171026

DESCRIPTION

zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference). JIRA issues fixed (https://issues.jboss.org/): ACM-2226 - [ACM 2.6.4] Build Submariner 0.13.3 ACM-2435 - [ACM 2.6.4] Verify Submariner with OCP 4.12 ACM-2821 - [Submariner] - 0.13.3 - Submariner does not support cluster "kube-proxy ipvs mode" 6. Description: Submariner enables direct networking between pods and services on different Kubernetes clusters that are either on-premises or in the cloud. For more information about Submariner, see the Submariner open source community website at: https://submariner.io/. This advisory contains bug fixes and enhancements to the Submariner container images. Security fixes: * CVE-2022-27664 golang: net/http: handle server errors after sending GOAWAY * CVE-2022-2880 golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-41715 golang: regexp/syntax: limit memory used by parsing regexps * CVE-2022-41717 golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests Bugs addressed: * subctl diagnose firewall metrics does not work on merged kubeconfig (BZ# 2013711) * [Submariner] - Fails to increase gateway amount after deployment (BZ# 2097381) * Submariner gateway node does not get deleted with subctl cloud cleanup command (BZ# 2108634) * submariner GW pods are unable to resolve the DNS of the Broker K8s API URL (BZ# 2119362) * Submariner gateway node does not get deployed after applying ManagedClusterAddOn on Openstack (BZ# 2124219) * unable to run subctl benchmark latency, pods fail with ImagePullBackOff (BZ# 2130326) * [IBM Z] - Submariner addon unistallation doesnt work from ACM console (BZ# 2136442) * Tags on AWS security group for gateway node break cloud-controller LoadBalancer (BZ# 2139477) * RHACM - Submariner: UI support for OpenStack #19297 (ACM-1242) * Submariner OVN support (ACM-1358) * Submariner Azure Console support (ACM-1388) * ManagedClusterSet consumers migrate to v1beta2 (ACM-1614) * Submariner on disconnected ACM #22000 (ACM-1678) * Submariner gateway: Error creating AWS security group if already exists (ACM-2055) * Submariner gateway security group in AWS not deleted when uninstalling submariner (ACM-2057) * The submariner-metrics-proxy pod pulls an image with wrong naming convention (ACM-2058) * The submariner-metrics-proxy pod is not part of the Agent readiness check (ACM-2067) * Subctl 0.14.0 prints version "vsubctl" (ACM-2132) * managedclusters "local-cluster" not found and missing Submariner Broker CRD (ACM-2145) * Add support of ARO to Submariner deployment (ACM-2150) * The e2e tests execution fails for "Basic TCP connectivity" tests (ACM-2204) * Gateway error shown "diagnose all" tests (ACM-2206) * Submariner does not support cluster "kube-proxy ipvs mode"(ACM-2211) * Vsphere cluster shows Pod Security admission controller warnings (ACM-2256) * Cannot use submariner with OSP and self signed certs (ACM-2274) * Subctl diagnose tests spawn nettest image with wrong tag nameing convention (ACM-2387) * Subctl 0.14.1 prints version "devel" (ACM-2482) 3. Bugs fixed (https://bugzilla.redhat.com/): 2013711 - subctl diagnose firewall metrics does not work on merged kubeconfig 2097381 - [Submariner] - Fails to increase gateway amount after deployment 2108634 - Submariner gateway node does not get deleted with subctl cloud cleanup command 2119362 - submariner GW pods are unable to resolve the DNS of the Broker K8s API URL 2124219 - Submariner gateway node does not get deployed after applying ManagedClusterAddOn on Openstack 2124669 - CVE-2022-27664 golang: net/http: handle server errors after sending GOAWAY 2130326 - unable to run subctl benchmark latency, pods fail with ImagePullBackOff 2132868 - CVE-2022-2880 golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters 2132872 - CVE-2022-41715 golang: regexp/syntax: limit memory used by parsing regexps 2136442 - [IBM Z] - Submariner addon unistallation doesnt work from ACM console 2139477 - Tags on AWS security group for gateway node break cloud-controller LoadBalancer 2161274 - CVE-2022-41717 golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests 5. JIRA issues fixed (https://issues.jboss.org/): ACM-1614 - ManagedClusterSet consumers migrate to v1beta2 (Submariner) ACM-2055 - Submariner gateway: Error creating AWS security group if already exists ACM-2057 - [Submariner] - submariner gateway security group in aws not deleted when uninstalling submariner ACM-2058 - [Submariner] - The submariner-metrics-proxy pod pulls an image with wrong naming convention ACM-2067 - [Submariner] - The submariner-metrics-proxy pod is not part of the Agent readiness check ACM-2132 - Subctl 0.14.0 prints version "vsubctl" ACM-2145 - managedclusters "local-cluster" not found and missing Submariner Broker CRD ACM-2150 - Add support of ARO to Submariner deployment ACM-2204 - [Submariner] - e2e tests execution fails for "Basic TCP connectivity" tests ACM-2206 - [Submariner] - Gateway error shown "diagnose all" tests ACM-2211 - [Submariner] - Submariner does not support cluster "kube-proxy ipvs mode" ACM-2256 - [Submariner] - Vsphere cluster shows Pod Security admission controller warnings ACM-2274 - Cannot use submariner with OSP and self signed certs ACM-2387 - [Submariner] - subctl diagnose tests spawn nettest image with wrong tag nameing convention ACM-2482 - Subctl 0.14.1 prints version "devel" 6. Bugs fixed (https://bugzilla.redhat.com/): 2142707 - CVE-2022-42920 Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing 5. Solution: For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes: https://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html For Red Hat OpenShift Logging 5.4, see the following instructions to apply this update: https://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html 4. LOG-3252 - [release-5.4]Adding Valid Subscription Annotation 6. Description: The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Bugs fixed (https://bugzilla.redhat.com/): 2092793 - CVE-2022-30629 golang: crypto/tls: session tickets lack random ticket_age_add 2107371 - CVE-2022-30630 golang: io/fs: stack exhaustion in Glob 2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header 2107376 - CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions 2107383 - CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working 2107386 - CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob 2107388 - CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode 2107390 - CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip 2107392 - CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal 2132957 - Migration fails at UnQuiesceDestApplications step in OCP 4.12 2137304 - Location for host cluster is missing in the UI 2140208 - When editing a MigHook in the UI, the page may fail to reload 2143628 - Unable to create Storage Class Conversion plan due to missing cronjob error in OCP 4.12 2143872 - Namespaces page in web console stuck in loading phase 2149920 - Migration fails at prebackupHooks step 5. Solution: Before applying this update, ensure all previously released errata relevant to your system have been applied. Follow the instructions linked in the References section to create service binding connections between applications and services using the Developer perspective in the OpenShift Container Platform web console. Bugs fixed (https://bugzilla.redhat.com/): 2134010 - CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags 5. JIRA issues fixed (https://issues.jboss.org/): APPSVC-1220 - Fix CVE-2022-32149 6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: zlib security update Advisory ID: RHSA-2022:7314-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:7314 Issue date: 2022-11-02 CVE Names: CVE-2022-37434 ==================================================================== 1. Summary: An update for zlib is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder (v. 9) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux AppStream (v. 9) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS (v. 9) - aarch64, ppc64le, s390x, x86_64 3. Description: The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux AppStream (v. 9): aarch64: minizip-compat-debuginfo-1.2.11-32.el9_0.aarch64.rpm zlib-debuginfo-1.2.11-32.el9_0.aarch64.rpm zlib-debugsource-1.2.11-32.el9_0.aarch64.rpm zlib-devel-1.2.11-32.el9_0.aarch64.rpm ppc64le: minizip-compat-debuginfo-1.2.11-32.el9_0.ppc64le.rpm zlib-debuginfo-1.2.11-32.el9_0.ppc64le.rpm zlib-debugsource-1.2.11-32.el9_0.ppc64le.rpm zlib-devel-1.2.11-32.el9_0.ppc64le.rpm s390x: minizip-compat-debuginfo-1.2.11-32.el9_0.s390x.rpm zlib-debuginfo-1.2.11-32.el9_0.s390x.rpm zlib-debugsource-1.2.11-32.el9_0.s390x.rpm zlib-devel-1.2.11-32.el9_0.s390x.rpm x86_64: minizip-compat-debuginfo-1.2.11-32.el9_0.i686.rpm minizip-compat-debuginfo-1.2.11-32.el9_0.x86_64.rpm zlib-debuginfo-1.2.11-32.el9_0.i686.rpm zlib-debuginfo-1.2.11-32.el9_0.x86_64.rpm zlib-debugsource-1.2.11-32.el9_0.i686.rpm zlib-debugsource-1.2.11-32.el9_0.x86_64.rpm zlib-devel-1.2.11-32.el9_0.i686.rpm zlib-devel-1.2.11-32.el9_0.x86_64.rpm Red Hat Enterprise Linux BaseOS (v. 9): Source: zlib-1.2.11-32.el9_0.src.rpm aarch64: minizip-compat-debuginfo-1.2.11-32.el9_0.aarch64.rpm zlib-1.2.11-32.el9_0.aarch64.rpm zlib-debuginfo-1.2.11-32.el9_0.aarch64.rpm zlib-debugsource-1.2.11-32.el9_0.aarch64.rpm ppc64le: minizip-compat-debuginfo-1.2.11-32.el9_0.ppc64le.rpm zlib-1.2.11-32.el9_0.ppc64le.rpm zlib-debuginfo-1.2.11-32.el9_0.ppc64le.rpm zlib-debugsource-1.2.11-32.el9_0.ppc64le.rpm s390x: minizip-compat-debuginfo-1.2.11-32.el9_0.s390x.rpm zlib-1.2.11-32.el9_0.s390x.rpm zlib-debuginfo-1.2.11-32.el9_0.s390x.rpm zlib-debugsource-1.2.11-32.el9_0.s390x.rpm x86_64: minizip-compat-debuginfo-1.2.11-32.el9_0.i686.rpm minizip-compat-debuginfo-1.2.11-32.el9_0.x86_64.rpm zlib-1.2.11-32.el9_0.i686.rpm zlib-1.2.11-32.el9_0.x86_64.rpm zlib-debuginfo-1.2.11-32.el9_0.i686.rpm zlib-debuginfo-1.2.11-32.el9_0.x86_64.rpm zlib-debugsource-1.2.11-32.el9_0.i686.rpm zlib-debugsource-1.2.11-32.el9_0.x86_64.rpm Red Hat CodeReady Linux Builder (v. 9): aarch64: minizip-compat-debuginfo-1.2.11-32.el9_0.aarch64.rpm zlib-debuginfo-1.2.11-32.el9_0.aarch64.rpm zlib-debugsource-1.2.11-32.el9_0.aarch64.rpm zlib-static-1.2.11-32.el9_0.aarch64.rpm ppc64le: minizip-compat-debuginfo-1.2.11-32.el9_0.ppc64le.rpm zlib-debuginfo-1.2.11-32.el9_0.ppc64le.rpm zlib-debugsource-1.2.11-32.el9_0.ppc64le.rpm zlib-static-1.2.11-32.el9_0.ppc64le.rpm s390x: minizip-compat-debuginfo-1.2.11-32.el9_0.s390x.rpm zlib-debuginfo-1.2.11-32.el9_0.s390x.rpm zlib-debugsource-1.2.11-32.el9_0.s390x.rpm zlib-static-1.2.11-32.el9_0.s390x.rpm x86_64: minizip-compat-debuginfo-1.2.11-32.el9_0.i686.rpm minizip-compat-debuginfo-1.2.11-32.el9_0.x86_64.rpm zlib-debuginfo-1.2.11-32.el9_0.i686.rpm zlib-debuginfo-1.2.11-32.el9_0.x86_64.rpm zlib-debugsource-1.2.11-32.el9_0.i686.rpm zlib-debugsource-1.2.11-32.el9_0.x86_64.rpm zlib-static-1.2.11-32.el9_0.i686.rpm zlib-static-1.2.11-32.el9_0.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-37434 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/security/updates/classification#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY2K9ItzjgjWX9erEAQiHfxAAlO5bDXesPL2aHyX6C15K0NCSqYYSugpc jh5XWHtBDSf0tFLDI7D0ru2cDe98WRoQ0MJNZA2HNwCx1tznW6jJX4cnYHlnCeC4 /thKFW1MfXV/n40Fu7Boq8BmrLCHixTwe/pGuz19YYIJeKexdDmN5mf5tYp01BXW uDwCfC0VgwU0zFcG4TXvHZdI+CDTFr/azkC/aXpFCVyTMZAw5ZiTRgu1WL/UKyrU prhsHcxXoICqJbJYu5gql3QGaXwGXYP/N7RMlfaSI60FL6trDE5+1f7eJTugsxwv jyaarOy7AWlno/lEMrffQ7/9k9xUpowt8Qt0LDjuTP3tPlGULkyb1DYQOUkttniD b4X4k/DY5PBwZTOeGsPBbFcvliwcwgMVqmGfZHZcsRc7VSsGzrGsyowVxvxJqasP VPjOMOKeQVEf3Kpl0Nvfd5D2k24NlqgXpiLpSevwkJTi6c7VWUPrGGCTmL5XUy8T 4ISiB+bDwlmI5LxhqOyVdHLeVnNaeR6wxEfQ855CDCXMAeElHodi+KxGvqrWceVQ pEinvfduBT1Y8HO8ztDWYJ6KM1r/9JOTiACpMoKGw5KqSQnSrPwCuoZIwlXK6fiE C26HKcnaq3GK0IDkT+LaVUtl4k8Ja8V4Rv0OMwU1JgbwTUTI/iQweKDAldn8/cbA NVQfk+Oscic=3u2M -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . JIRA issues fixed (https://issues.jboss.org/): LOG-2860 - Error on LokiStack Components when forwarding logs to Loki on proxy cluster LOG-3131 - vector: kube API server certificate validation failure due to hostname mismatch LOG-3222 - [release-5.5] fluentd plugin for kafka ca-bundle secret doesn't support multiple CAs LOG-3226 - FluentdQueueLengthIncreasing rule failing to be evaluated. LOG-3284 - [release-5.5][Vector] logs parsed into structured when json is set without structured types. LOG-3287 - [release-5.5] Increase value of cluster-logging PriorityClass to move closer to system-cluster-critical value LOG-3301 - [release-5.5][ClusterLogging] elasticsearchStatus in ClusterLogging instance CR is not updated when Elasticsearch status is changed LOG-3305 - [release-5.5] Kibana Authentication Exception cookie issue LOG-3310 - [release-5.5] Can't choose correct CA ConfigMap Key when creating lokistack in Console LOG-3332 - [release-5.5] Reconcile error on controller when creating LokiStack with tls config 6. ========================================================================== Ubuntu Security Notice USN-6736-1 April 16, 2024 klibc vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 23.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) - Ubuntu 16.04 LTS (Available with Ubuntu Pro) - Ubuntu 14.04 LTS (Available with Ubuntu Pro) Summary: Several security issues were fixed in klibc. Software Description: - klibc: small utilities built with klibc for early boot Details: It was discovered that zlib, vendored in klibc, incorrectly handled pointer arithmetic. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2016-9840, CVE-2016-9841) Danilo Ramos discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain deflating operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2018-25032) Evgeny Legerov discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain inflate operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2022-37434) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 23.10: klibc-utils 2.0.13-1ubuntu0.1 libklibc 2.0.13-1ubuntu0.1 Ubuntu 22.04 LTS: klibc-utils 2.0.10-4ubuntu0.1 libklibc 2.0.10-4ubuntu0.1 Ubuntu 20.04 LTS: klibc-utils 2.0.7-1ubuntu5.2 libklibc 2.0.7-1ubuntu5.2 Ubuntu 18.04 LTS (Available with Ubuntu Pro): klibc-utils 2.0.4-9ubuntu2.2+esm1 libklibc 2.0.4-9ubuntu2.2+esm1 Ubuntu 16.04 LTS (Available with Ubuntu Pro): klibc-utils 2.0.4-8ubuntu1.16.04.4+esm2 libklibc 2.0.4-8ubuntu1.16.04.4+esm2 Ubuntu 14.04 LTS (Available with Ubuntu Pro): klibc-utils 2.0.3-0ubuntu1.14.04.3+esm3 libklibc 2.0.3-0ubuntu1.14.04.3+esm3 In general, a standard system update will make all the necessary changes

Trust: 1.98

sources: NVD: CVE-2022-37434 // VULHUB: VHN-428208 // VULMON: CVE-2022-37434 // PACKETSTORM: 171026 // PACKETSTORM: 170898 // PACKETSTORM: 170759 // PACKETSTORM: 169920 // PACKETSTORM: 170243 // PACKETSTORM: 169726 // PACKETSTORM: 169804 // PACKETSTORM: 169707 // PACKETSTORM: 170162 // PACKETSTORM: 178074

AFFECTED PRODUCTS

vendor:stormshieldmodel:network securityscope:gteversion:4.6.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:netappmodel:h300sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:hciscope:eqversion: -

Trust: 1.0

vendor:netappmodel:storagegridscope:eqversion: -

Trust: 1.0

vendor:netappmodel:oncommand workflow automationscope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:37

Trust: 1.0

vendor:zlibmodel:zlibscope:lteversion:1.2.12

Trust: 1.0

vendor:applemodel:iphone osscope:gteversion:16.0

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.7.1

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:3.7.34

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:netappmodel:management services for element softwarescope:eqversion: -

Trust: 1.0

vendor:netappmodel:h700sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:3.7.31

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:15.7.1

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:3.11.22

Trust: 1.0

vendor:netappmodel:h500sscope:eqversion: -

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:4.6.3

Trust: 1.0

vendor:applemodel:macosscope:ltversion:12.6.1

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:4.3.16

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:36

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:4.3.0

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:3.11.0

Trust: 1.0

vendor:netappmodel:hci compute nodescope:eqversion: -

Trust: 1.0

vendor:applemodel:macosscope:gteversion:11.0

Trust: 1.0

vendor:netappmodel:ontap select deploy administration utilityscope:eqversion: -

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:15.7.1

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:16.1

Trust: 1.0

vendor:applemodel:macosscope:gteversion:12.0.0

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:9.1

Trust: 1.0

sources: NVD: CVE-2022-37434

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-37434
value: CRITICAL

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-37434
value: CRITICAL

Trust: 1.0

nvd@nist.gov: CVE-2022-37434
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

sources: NVD: CVE-2022-37434 // NVD: CVE-2022-37434

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-120

Trust: 1.0

sources: VULHUB: VHN-428208 // NVD: CVE-2022-37434

TYPE

overflow

Trust: 0.1

sources: PACKETSTORM: 169707

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-428208

PATCH

title:Debian CVElist Bug Report Logs: zlib: CVE-2022-37434url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=f5712d783fb1fc3f3fa283bb16da0e35

Trust: 0.1

title: - url:https://github.com/ivd38/zlib_overflow

Trust: 0.1

sources: VULMON: CVE-2022-37434

EXTERNAL IDS

db:NVDid:CVE-2022-37434

Trust: 2.2

db:OPENWALLid:OSS-SECURITY/2022/08/05/2

Trust: 1.2

db:OPENWALLid:OSS-SECURITY/2022/08/09/1

Trust: 1.1

db:PACKETSTORMid:169707

Trust: 0.2

db:PACKETSTORMid:169726

Trust: 0.2

db:PACKETSTORMid:170027

Trust: 0.1

db:PACKETSTORMid:169503

Trust: 0.1

db:PACKETSTORMid:171271

Trust: 0.1

db:PACKETSTORMid:169624

Trust: 0.1

db:PACKETSTORMid:168107

Trust: 0.1

db:PACKETSTORMid:169566

Trust: 0.1

db:PACKETSTORMid:169906

Trust: 0.1

db:PACKETSTORMid:169783

Trust: 0.1

db:PACKETSTORMid:169557

Trust: 0.1

db:PACKETSTORMid:168113

Trust: 0.1

db:PACKETSTORMid:169577

Trust: 0.1

db:PACKETSTORMid:168765

Trust: 0.1

db:PACKETSTORMid:169595

Trust: 0.1

db:VULHUBid:VHN-428208

Trust: 0.1

db:VULMONid:CVE-2022-37434

Trust: 0.1

db:PACKETSTORMid:171026

Trust: 0.1

db:PACKETSTORMid:170898

Trust: 0.1

db:PACKETSTORMid:170759

Trust: 0.1

db:PACKETSTORMid:169920

Trust: 0.1

db:PACKETSTORMid:170243

Trust: 0.1

db:PACKETSTORMid:169804

Trust: 0.1

db:PACKETSTORMid:170162

Trust: 0.1

db:PACKETSTORMid:178074

Trust: 0.1

sources: VULHUB: VHN-428208 // VULMON: CVE-2022-37434 // PACKETSTORM: 171026 // PACKETSTORM: 170898 // PACKETSTORM: 170759 // PACKETSTORM: 169920 // PACKETSTORM: 170243 // PACKETSTORM: 169726 // PACKETSTORM: 169804 // PACKETSTORM: 169707 // PACKETSTORM: 170162 // PACKETSTORM: 178074 // NVD: CVE-2022-37434

REFERENCES

url:https://github.com/ivd38/zlib_overflow

Trust: 1.3

url:http://www.openwall.com/lists/oss-security/2022/08/05/2

Trust: 1.2

url:https://github.com/curl/curl/issues/9271

Trust: 1.2

url:https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#l1062-l1063

Trust: 1.2

url:https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1

Trust: 1.2

url:https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#l762-l764

Trust: 1.2

url:http://seclists.org/fulldisclosure/2022/oct/37

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/oct/38

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/oct/41

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/oct/42

Trust: 1.1

url:https://www.debian.org/security/2022/dsa-5218

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/pavpqncg3xrlclnsqrm3kan5zfmvxvty/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nmboj77a7t7pqcarmduk75te6llesz3o/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/yrqai7h4m4rqz2iwzueexecbe5d56bh2/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/x5u7otkzshy2i3zfjsr2shfhw72rkgdk/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/jwn4ve3jqr4o2sous5txnlanrpmhwv4i/

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2022/08/09/1

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20220901-0005/

Trust: 1.1

url:https://support.apple.com/kb/ht213488

Trust: 1.1

url:https://support.apple.com/kb/ht213489

Trust: 1.1

url:https://support.apple.com/kb/ht213490

Trust: 1.1

url:https://support.apple.com/kb/ht213491

Trust: 1.1

url:https://support.apple.com/kb/ht213493

Trust: 1.1

url:https://support.apple.com/kb/ht213494

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20230427-0007/

Trust: 1.0

url:https://github.com/madler/zlib/commit/1eb7682f845ac9e9bf9ae35bbfb3bad5dacbd91d

Trust: 1.0

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2022-37434

Trust: 0.9

url:https://bugzilla.redhat.com/):

Trust: 0.9

url:https://access.redhat.com/security/team/contact/

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2020-35527

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2020-35527

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-35525

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2020-35525

Trust: 0.8

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2022-2509

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2022-3515

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2022-22629

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-22624

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-22662

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-22628

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-1304

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-26717

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-26710

Trust: 0.6

url:https://issues.jboss.org/):

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-26719

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-26700

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-26716

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2016-3709

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-30293

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2016-3709

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-26709

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-2509

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-1304

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-40674

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-32149

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-42898

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-35737

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-22628

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-46848

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-22662

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-26709

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-46848

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-22624

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-26710

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-26700

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-22629

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-27664

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-0865

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-1355

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-0909

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-0924

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-0561

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-0908

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-0561

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-0865

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-27404

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-0562

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-27405

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-27406

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-0562

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-22844

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-0891

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-37434

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-3821

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-43680

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-40304

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-2601

Trust: 0.2

url:https://submariner.io/.

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3787

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2601

Trust: 0.2

url:https://submariner.io/getting-started/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42012

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42010

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3775

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-40303

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-30698

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-30699

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41974

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42011

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41715

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-2880

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0891

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-25308

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0908

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-25310

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0924

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-25309

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0909

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42004

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-36518

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42003

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-36518

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-32189

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21628

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21626

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21619

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21618

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21624

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-39399

Trust: 0.2

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016710

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:0795

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/add-ons/add-ons-overview#submariner-deploy-console

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/add-ons/submariner#deploying-submariner-console

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41717

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:0631

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1471

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42920

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:0470

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1355

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1471

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26716

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:7435

Trust: 0.1

url:https://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1962

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28852

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1122

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28131

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-32148

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28852

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28851

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30630

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1705

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30632

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28851

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:9047

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30629

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1122

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30633

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30635

Trust: 0.1

url:https://access.redhat.com/articles/11258.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32149

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:7407

Trust: 0.1

url:https://docs.openshift.com/container-platform/latest/applications/connecting_applications_to_services/odc-connecting-an-application-to-a-service-using-the-developer-perspective.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3515

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21626

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2588

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-release-notes.html

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-upgrading.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0494

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21618

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0494

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23816

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21624

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21628

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6882

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23825

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1353

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1353

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23816

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29900

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23825

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29900

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29901

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2588

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21619

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:7314

Trust: 0.1

url:https://access.redhat.com/security/updates/classification#moderate

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28390

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-30002

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24448

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-27950

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3640

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2068

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2097

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-36558

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0168

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0854

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-20368

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0617

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2586

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:8781

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25255

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0168

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-30002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-36516

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1016

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28893

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0854

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3640

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2879

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1927

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2078

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0617

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.11/logging/cluster-logging-upgrading.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1852

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-36946

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1055

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-26373

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2938

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1048

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-36516

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23960

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1785

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-36558

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1586

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29581

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-34903

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1184

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1897

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21499

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2639

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1292

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-37603

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/klibc/2.0.10-4ubuntu0.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6736-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25032

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9840

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/klibc/2.0.13-1ubuntu0.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/klibc/2.0.7-1ubuntu5.2

Trust: 0.1

sources: VULHUB: VHN-428208 // VULMON: CVE-2022-37434 // PACKETSTORM: 171026 // PACKETSTORM: 170898 // PACKETSTORM: 170759 // PACKETSTORM: 169920 // PACKETSTORM: 170243 // PACKETSTORM: 169726 // PACKETSTORM: 169804 // PACKETSTORM: 169707 // PACKETSTORM: 170162 // PACKETSTORM: 178074 // NVD: CVE-2022-37434

CREDITS

Red Hat

Trust: 0.9

sources: PACKETSTORM: 171026 // PACKETSTORM: 170898 // PACKETSTORM: 170759 // PACKETSTORM: 169920 // PACKETSTORM: 170243 // PACKETSTORM: 169726 // PACKETSTORM: 169804 // PACKETSTORM: 169707 // PACKETSTORM: 170162

SOURCES

db:VULHUBid:VHN-428208
db:VULMONid:CVE-2022-37434
db:PACKETSTORMid:171026
db:PACKETSTORMid:170898
db:PACKETSTORMid:170759
db:PACKETSTORMid:169920
db:PACKETSTORMid:170243
db:PACKETSTORMid:169726
db:PACKETSTORMid:169804
db:PACKETSTORMid:169707
db:PACKETSTORMid:170162
db:PACKETSTORMid:178074
db:NVDid:CVE-2022-37434

LAST UPDATE DATE

2025-11-28T21:41:52.316000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-428208date:2023-01-09T00:00:00
db:VULMONid:CVE-2022-37434date:2022-08-08T00:00:00
db:NVDid:CVE-2022-37434date:2025-05-30T20:15:30.030

SOURCES RELEASE DATE

db:VULHUBid:VHN-428208date:2022-08-05T00:00:00
db:VULMONid:CVE-2022-37434date:2022-08-05T00:00:00
db:PACKETSTORMid:171026date:2023-02-16T15:45:25
db:PACKETSTORMid:170898date:2023-02-08T16:00:47
db:PACKETSTORMid:170759date:2023-01-27T15:03:38
db:PACKETSTORMid:169920date:2022-11-17T13:23:05
db:PACKETSTORMid:170243date:2022-12-15T15:35:54
db:PACKETSTORMid:169726date:2022-11-04T13:43:28
db:PACKETSTORMid:169804date:2022-11-09T19:52:14
db:PACKETSTORMid:169707date:2022-11-03T13:03:55
db:PACKETSTORMid:170162date:2022-12-08T16:34:22
db:PACKETSTORMid:178074date:2024-04-16T14:05:51
db:NVDid:CVE-2022-37434date:2022-08-05T07:15:07.240