ID

VAR-202203-1690


CVE

CVE-2018-25032


TITLE

zlib  Out-of-bounds write vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-001952

DESCRIPTION

zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches. zlib Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. Relevant releases/architectures: Red Hat CodeReady Linux Builder (v. 9) - aarch64, ppc64le, s390x, x86_64 3. Description: The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Security Fix(es): * zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2067945 - CVE-2018-25032 zlib: A flaw found in zlib when compressing (not decompressing) certain inputs 6. Package List: Red Hat Enterprise Linux AppStream (v. 9): Source: zlib-1.2.11-31.el9_0.1.src.rpm aarch64: minizip-compat-debuginfo-1.2.11-31.el9_0.1.aarch64.rpm zlib-1.2.11-31.el9_0.1.aarch64.rpm zlib-debuginfo-1.2.11-31.el9_0.1.aarch64.rpm zlib-debugsource-1.2.11-31.el9_0.1.aarch64.rpm ppc64le: minizip-compat-debuginfo-1.2.11-31.el9_0.1.ppc64le.rpm zlib-1.2.11-31.el9_0.1.ppc64le.rpm zlib-debuginfo-1.2.11-31.el9_0.1.ppc64le.rpm zlib-debugsource-1.2.11-31.el9_0.1.ppc64le.rpm s390x: minizip-compat-debuginfo-1.2.11-31.el9_0.1.s390x.rpm zlib-1.2.11-31.el9_0.1.s390x.rpm zlib-debuginfo-1.2.11-31.el9_0.1.s390x.rpm zlib-debugsource-1.2.11-31.el9_0.1.s390x.rpm x86_64: minizip-compat-debuginfo-1.2.11-31.el9_0.1.i686.rpm minizip-compat-debuginfo-1.2.11-31.el9_0.1.x86_64.rpm zlib-1.2.11-31.el9_0.1.i686.rpm zlib-1.2.11-31.el9_0.1.x86_64.rpm zlib-debuginfo-1.2.11-31.el9_0.1.i686.rpm zlib-debuginfo-1.2.11-31.el9_0.1.x86_64.rpm zlib-debugsource-1.2.11-31.el9_0.1.i686.rpm zlib-debugsource-1.2.11-31.el9_0.1.x86_64.rpm Red Hat CodeReady Linux Builder (v. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. All OpenShift Container Platform 4.11 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html 3. Solution: For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2042536 - OCP 4.10: nfd-topology-updater daemonset fails to get created on worker nodes - forbidden: unable to validate against any security context constraint 2042652 - Unable to deploy hw-event-proxy operator 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter 2047308 - Remove metrics and events for master port offsets 2055049 - No pre-caching for NFD images 2055436 - nfd-master tracking the wrong api group 2055439 - nfd-master tracking the wrong api group (operand) 2057569 - nfd-worker: drop 'custom-' prefix from matchFeatures custom rules 2058256 - LeaseDuration for NFD Operator seems to be rather small, causing Operator restarts when running etcd defrag 2062849 - hw event proxy is not binding on ipv6 local address 2066860 - Wrong spec in NFD documentation under `operand` 2066887 - Dependabot alert: Path traversal in github.com/valyala/fasthttp 2066889 - Dependabot alert: Path traversal in github.com/valyala/fasthttp 2067312 - PPT event source is lost when received by the consumer 2077243 - NFD os release label lost after upgrade to ocp 4.10.6 2087511 - NFD SkipRange is wrong causing OLM install problems 2089962 - Node feature Discovery operator installation failed. 2090774 - Add Readme to plugin directory 2091106 - Dependabot alert: Unhandled exception in gopkg.in/yaml.v3 2091142 - Dependabot alert: Unhandled exception in gopkg.in/yaml.v3 2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS 5. Description: Service Telemetry Framework (STF) provides automated collection of measurements and data from remote clients, such as Red Hat OpenStack Platform or third-party nodes. Dockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally. Bugs fixed (https://bugzilla.redhat.com/): 2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read 5. Security Fix(es): * argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. Bugs fixed (https://bugzilla.redhat.com/): 2096278 - CVE-2022-31035 argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI 2096282 - CVE-2022-31034 argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. 2096283 - CVE-2022-31016 argocd: vulnerable to an uncontrolled memory consumption bug 2096291 - CVE-2022-31036 argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access 5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: ACS 3.70 enhancement and security update Advisory ID: RHSA-2022:4880-01 Product: RHACS Advisory URL: https://access.redhat.com/errata/RHSA-2022:4880 Issue date: 2022-06-02 CVE Names: CVE-2018-25032 CVE-2021-3634 CVE-2021-3672 CVE-2021-3737 CVE-2021-4189 CVE-2021-23222 CVE-2021-23820 CVE-2021-25219 CVE-2021-41190 CVE-2022-1154 CVE-2022-1271 ==================================================================== 1. Summary: Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). The updated image includes bug fixes and feature improvements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: New features and enhancements 1. Verifying image signatures against Cosign public keys: You can use RHACS to ensure the integrity of the container images in your clusters by verifying image signatures against preconfigured keys. You can also create policies to block unsigned images and images that do not have a verified signature and enforce the policy by using an admission controller to stop unauthorized deployment creation. 2. Registry integrations for Amazon Elastic Container Registry (ECR) are now automatically generated for Amazon Web Services (AWS) clusters. This feature requires that the nodes' Instance Identity and Access Management (IAM) Role has been granted access to ECR. You can turn off this feature by disabling the EC2 instance metadata service in your nodes. 3. Identifying missing Kubernetes network policies: RHACS 3.70 ships with a new default policy that allows you to easily identify deployments that are not restricted by any ingress network policy and to trigger violation alerts accordingly. The default policy is named Deployments should have at least one ingress Network Policy. It is disabled by default. This default policy uses a new policy criterion called "Alert on missing ingress Network Policy." To identify pod isolation gaps, you can clone this default policy or create a new one by using the policy criterion and enabling it on selected resources. 4. A policy to detect the Spring Cloud Function RCE vulnerability [CVE-2022-22963] and the Spring Framework Spring4Shell RCE vulnerability [CVE-2022-22965] has been added. It has a severity level of Critical and is enabled by default. 5. A new policy criterion has been added to validate the value of allowPrivilegeEscalation within the Kubernetes security context. You can use this policy criterion to provide alerts when a deployment is configured to allow a container process to gain more privileges than its parent process. 6. Customers using the recommended Operator method to deploy RHACS on OpenShift Container Platform can now view the credentials for the admin user in the OpenShift Container Platform console. When viewing the Central object, the Details tab provides a clickable link to the credentials under Admin Password Secret Reference. The displayed credentials are the default generated password or a previously configured and stored custom secret. 7. Previously, RHACS limited the number of allowed inclusion and exclusion scopes within a scope to ten each. This restriction has been removed. Notable technical changes 1. Vulnerability scanning and reporting for RHCOS nodes: Vulnerability scanning and reporting for Red Hat Enterprise Linux CoreOS (RHCOS) nodes has been disabled until scanning improvements are made for improved accuracy and to support full host-level scanning beyond just Kubernetes components. Currently, RHCOS uses National Vulnerability Database (NVD) vulnerability data for reporting vulnerabilities for Kubernetes components from RHCOS. In the enhanced version, vulnerability reporting will be based on Red Hat published security data. (ROX-10662) Deprecated Features: - - Ability to add comments to alerts and processes - - Anchore, Tenable, and Docker Trusted registry integrations - - External authorization plug-in for scoped access control - - FROM option in the Disallowed Dockerfile line policy field - - RenamePolicyCategory and DeletePolicyCategory API endpoints - - --rhacs option for the roxctl helm output command Removed Features: - - Ability to delete default policies - - Security policies without a policyVersion - - /v1/policies API endpoint response: field response body parameter Security Fixes: * json-pointer: type confusion vulnerability can lead to a bypass of CVE-2020-7709 when the pointer components are arrays (CVE-2021-23820) * opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190) 3. Solution: To take advantage of the new features, bug fixes, and enhancements in RHACS 3.70 you are advised to upgrade to RHACS 3.70.0. 4. Bugs fixed (https://bugzilla.redhat.com/): 2020369 - CVE-2021-23820 json-pointer: type confusion vulnerability can lead to a bypass of CVE-2020-7709 when the pointer components are arrays 2024938 - CVE-2021-41190 opencontainers: OCI manifest and index parsing confusion 5. JIRA issues fixed (https://issues.jboss.org/): ROX-11147 - Release RHACS 3.70.0 ROX-9625 - Central is susceptible to connection reuse issues when running on OpenShift ROX-9902 - Generic webhook notifier with username/password not working 6. References: https://access.redhat.com/security/cve/CVE-2018-25032 https://access.redhat.com/security/cve/CVE-2021-3634 https://access.redhat.com/security/cve/CVE-2021-3672 https://access.redhat.com/security/cve/CVE-2021-3737 https://access.redhat.com/security/cve/CVE-2021-4189 https://access.redhat.com/security/cve/CVE-2021-23222 https://access.redhat.com/security/cve/CVE-2021-23820 https://access.redhat.com/security/cve/CVE-2021-25219 https://access.redhat.com/security/cve/CVE-2021-41190 https://access.redhat.com/security/cve/CVE-2022-1154 https://access.redhat.com/security/cve/CVE-2022-1271 https://access.redhat.com/security/updates/classification/#moderate https://docs.openshift.com/acs/3.69/release_notes/370-release-notes.html 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYphyENzjgjWX9erEAQhaMg/8Cdc2cZjgk8oqbk/N+zTUodLQUSbGuwyV SiKJGvCHo1ppVLMpVP9D2hYEVS6HMOsNskf5yApxF95Id68j7TQUNbhnUx3lyUO9 ZYcfxLjLVrHZq7iNumm6O0R03wqb+9TEYe3xU7p4z6pRX2dPO9M/TbjO/fsvvVSz B2JG32FVxGZJpqnaSkhWBP7NQ5ih8YrlGsdh6G5ip02MeDS3u/peXD+t/wHxSL24 Y5ao1LPKHJ/0soOKgGK/I/PkcbqSS38/wFmy2ohFwZsf5WWs+fLS2f2kbkP8FSKY 57kJtK2v4X7uRn3npO5B3qwZs1M06+6s/SavOxU0aAMkivmNuFvpLzdJLawPHBP2 y7j3Qxyq3H8rm0h7Rya/oIEP6MhxjCot2z4WrXES2B1J79lg7I1E3YoXQEaLhS1p eqhQ7QQksbB53AG2Eq+TmJR0oacb1xptotNGqSY2WZtLchxrTnadvTFEVJhhBHxn hG2zlNnjXoJKQdwJv2G/X7UemzeBqmhd8rHOGp4+WyASse7qS5LIXGZkqR1oRqlW TgHhg7a0R9N2yhK8N9QZnJKB4+xo2xeZ0tRLh/WYUh+V1icP/l9jH9c4ec9DGtyd uPamMUtVfrGcTbCluQPRZpNii+TwB8yyzEVcQBVwef5UfHmIe5qtCwE46U0V7eV+ rJ9xYHG86hA=r90W -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description: Release of RHACS 3.69.2 Security Fix(es): * stackrox: Improper sanitization allows users to retrieve Notifier secrets from GraphQL API in plaintext (CVE-2022-1902) 3. Bugs fixed (https://bugzilla.redhat.com/): 2090957 - CVE-2022-1902 stackrox: Improper sanitization allows users to retrieve Notifier secrets from GraphQL API in plaintext 5. Description: The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Bugs fixed (https://bugzilla.redhat.com/): 1928937 - CVE-2021-23337 nodejs-lodash: command injection via template 1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions 2054663 - CVE-2022-0512 nodejs-url-parse: authorization bypass through user-controlled key 2057442 - CVE-2022-0639 npm-url-parse: Authorization Bypass Through User-Controlled Key 2060018 - CVE-2022-0686 npm-url-parse: Authorization bypass through user-controlled key 2060020 - CVE-2022-0691 npm-url-parse: authorization bypass through user-controlled key 2085307 - CVE-2022-1650 eventsource: Exposure of Sensitive Information 2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read 5. ========================================================================== Ubuntu Security Notice USN-6736-2 May 23, 2024 klibc vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 24.04 LTS Summary: Several security issues were fixed in klibc. Software Description: - klibc: small utilities built with klibc for early boot Details: USN-6736-1 fixed vulnerabilities in klibc. This update provides the corresponding updates for Ubuntu 24.04 LTS. Original advisory details: It was discovered that zlib, vendored in klibc, incorrectly handled pointer arithmetic. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2016-9840, CVE-2016-9841) Danilo Ramos discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain deflating operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2018-25032) Evgeny Legerov discovered that zlib, vendored in klibc, incorrectly handled memory when performing certain inflate operations. An attacker could use this issue to cause klibc to crash or to possibly execute arbitrary code. (CVE-2022-37434) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 24.04 LTS klibc-utils 2.0.13-4ubuntu0.1 libklibc 2.0.13-4ubuntu0.1 In general, a standard system update will make all the necessary changes

Trust: 2.52

sources: NVD: CVE-2018-25032 // JVNDB: JVNDB-2022-001952 // VULHUB: VHN-418557 // VULMON: CVE-2018-25032 // PACKETSTORM: 167389 // PACKETSTORM: 168036 // PACKETSTORM: 168011 // PACKETSTORM: 167594 // PACKETSTORM: 167364 // PACKETSTORM: 167591 // PACKETSTORM: 168352 // PACKETSTORM: 178769

AFFECTED PRODUCTS

vendor:applemodel:macosscope:ltversion:12.4

Trust: 1.0

vendor:netappmodel:ontap select deploy administration utilityscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:scalance sc626-2cscope:ltversion:3.0

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.5.0

Trust: 1.0

vendor:siemensmodel:scalance sc636-2cscope:ltversion:3.0

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:7.52

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:3.8.0

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:17.32

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:15.38

Trust: 1.0

vendor:netappmodel:h500sscope:eqversion: -

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:3.10.5

Trust: 1.0

vendor:netappmodel:management services for element softwarescope:eqversion: -

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.4.26

Trust: 1.0

vendor:siemensmodel:scalance sc642-2cscope:ltversion:3.0

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:13.46

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:lteversion:11.70.2

Trust: 1.0

vendor:netappmodel:oncommand workflow automationscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:scalance sc632-2cscope:ltversion:3.0

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:3.9.0

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:3.7.0

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:gteversion:11.0.0

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:6.45

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.9.2

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.4.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:gotomodel:gotoassistscope:ltversion:11.9.18

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:36

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:3.9.13

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:8.60

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.7.5

Trust: 1.0

vendor:netappmodel:h410cscope:eqversion: -

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.8.4

Trust: 1.0

vendor:siemensmodel:scalance sc622-2cscope:ltversion:3.0

Trust: 1.0

vendor:netappmodel:h300sscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:scalance sc646-2cscope:ltversion:3.0

Trust: 1.0

vendor:netappmodel:h410sscope:eqversion: -

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.9.0

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:3.8.14

Trust: 1.0

vendor:applemodel:mac os xscope:gteversion:10.15

Trust: 1.0

vendor:netappmodel:h700sscope:eqversion: -

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.6.6

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.7

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.3.0

Trust: 1.0

vendor:applemodel:macosscope:gteversion:11.0

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.5.17

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.7.0

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:3.7.14

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:3.10.0

Trust: 1.0

vendor:zlibmodel:zlibscope:ltversion:1.2.12

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:11.54

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.6.9

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.8.0

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.6.0

Trust: 1.0

vendor:netappmodel:hci compute nodescope:eqversion: -

Trust: 1.0

vendor:applemodel:macosscope:gteversion:12.0.0

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.15.7

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.3.36

Trust: 1.0

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:zlibmodel:zlibscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-001952 // NVD: CVE-2018-25032

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-25032
value: HIGH

Trust: 1.0

NVD: CVE-2018-25032
value: HIGH

Trust: 0.8

VULHUB: VHN-418557
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-25032
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-25032
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-418557
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-25032
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2018-25032
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-418557 // VULMON: CVE-2018-25032 // JVNDB: JVNDB-2022-001952 // NVD: CVE-2018-25032

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-418557 // JVNDB: JVNDB-2022-001952 // NVD: CVE-2018-25032

THREAT TYPE

remote

Trust: 0.1

sources: PACKETSTORM: 168011

TYPE

xss

Trust: 0.1

sources: PACKETSTORM: 167594

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-418557

PATCH

title:hitachi-sec-2022-210url:https://www.debian.org/security/2022/dsa-5111

Trust: 0.8

title:Debian Security Advisories: DSA-5111-1 zlib -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=1953a09ed6b6acb885ad5f0bc5c6a1cb

Trust: 0.1

title:Debian CVElist Bug Report Logs: CVE-2018-25032: zlib memory corruption on deflateurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=aa0fc3d1bfe74e5ba24eb36e6014b06b

Trust: 0.1

title:Amazon Linux AMI: ALAS-2022-1602url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2022-1602

Trust: 0.1

title:Amazon Linux AMI: ALAS-2022-1640url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2022-1640

Trust: 0.1

title:Amazon Linux 2: ALAS2-2022-1772url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2022-1772

Trust: 0.1

title:Amazon Linux 2022: ALAS2022-2022-159url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022&qid=ALAS2022-2022-159

Trust: 0.1

title:Amazon Linux 2022: ALAS2022-2022-100url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022&qid=ALAS2022-2022-100

Trust: 0.1

title:Red Hat: url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2018-25032

Trust: 0.1

title:Red Hat: Important: zlib security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224845 - Security Advisory

Trust: 0.1

title:Red Hat: Important: zlib security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221642 - Security Advisory

Trust: 0.1

title:Red Hat: Important: zlib security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221591 - Security Advisory

Trust: 0.1

title:Red Hat: Important: rsync security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222197 - Security Advisory

Trust: 0.1

title:Red Hat: Important: rsync security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222192 - Security Advisory

Trust: 0.1

title:Red Hat: Important: mingw-zlib security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20227813 - Security Advisory

Trust: 0.1

title:Red Hat: Important: rsync security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224592 - Security Advisory

Trust: 0.1

title:Red Hat: Important: zlib security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20230976 - Security Advisory

Trust: 0.1

title:Red Hat: Important: zlib security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222214 - Security Advisory

Trust: 0.1

title:Red Hat: Important: zlib security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222213 - Security Advisory

Trust: 0.1

title:Red Hat: Important: rsync security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222201 - Security Advisory

Trust: 0.1

title:Red Hat: Important: rsync security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222198 - Security Advisory

Trust: 0.1

title:Red Hat: Important: zlib security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221661 - Security Advisory

Trust: 0.1

title:Red Hat: Important: zlib security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224584 - Security Advisory

Trust: 0.1

title:Red Hat: Important: zlib security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20230943 - Security Advisory

Trust: 0.1

title:Red Hat: Important: mingw-zlib security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20228420 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2018-25032

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.9.35 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222283 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.6.58 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222264 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.7.51 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222268 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.6.58 security and extras updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222265 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Virtualization 4.10.2 Images security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225026 - Security Advisory

Trust: 0.1

title:Red Hat: Important: RHV-H security update (redhat-virtualization-host) 4.3.23url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225439 - Security Advisory

Trust: 0.1

title:Amazon Linux 2022: ALAS2022-2022-158url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022&qid=ALAS2022-2022-158

Trust: 0.1

title:Red Hat: Moderate: Cryostat 2.1.1: new Cryostat on RHEL 8 container imagesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224985 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat OpenShift GitOps security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225152 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat OpenShift GitOps security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225187 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat OpenShift GitOps security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225192 - Security Advisory

Trust: 0.1

title:Brocade Security Advisories: Access Deniedurl:https://vulmon.com/vendoradvisory?qidtp=brocade_security_advisories&qid=ac82ca9e02281afb3f0356588beedb43

Trust: 0.1

title:Red Hat: Moderate: Release of OpenShift Serverless Version 1.22.1url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224863 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Release of containers for OSP 16.2.z director operator tech previewurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222183 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Virtualization 4.8.7 Images bug fixes and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20226890 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat OpenShift GitOps security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224691 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.8.41 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222272 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat OpenShift GitOps security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224671 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat OpenShift GitOps security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224692 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Cryostat 2.1.0: new Cryostat on RHEL 8 container imagesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221679 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: security update for rh-sso-7/sso75-openshift-rhel8 container imageurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221713 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Secondary Scheduler Operator for Red Hat OpenShift 1.0.1 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225699 - Security Advisory

Trust: 0.1

title:Red Hat: Important: RHACS 3.69 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225188 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: ACS 3.70 enhancement and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224880 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 3.11.705 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222281 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat OpenShift GitOps security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224690 - Security Advisory

Trust: 0.1

title:Red Hat: Important: RHACS 3.68 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225132 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat Advanced Cluster Management 2.3.10 security updates and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221715 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat OpenShift Logging Security and Bug update Release 5.4.1url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222216 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Openshift Logging Security and Bug update Release (5.2.10)url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222218 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat OpenShift Logging Security and Bug update Release 5.3.7url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222217 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat Advanced Cluster Management 2.4.4 security updates and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221681 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat OpenShift Service Mesh 2.1.3 Containers security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225006 - Security Advisory

Trust: 0.1

title:Red Hat: Low: Release of OpenShift Serverless Version 1.22.0url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221747 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Migration Toolkit for Containers (MTC) 1.7.3 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225840 - Security Advisory

Trust: 0.1

title:Apple: macOS Monterey 12.4url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=73857ee26a600b1527481f1deacc0619

Trust: 0.1

title:Red Hat: Moderate: Migration Toolkit for Containers (MTC) 1.6.5 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224814 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Migration Toolkit for Containers (MTC) 1.7.2 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225483 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.11.0 extras and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225070 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Virtualization 4.11.0 Images security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20226526 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Migration Toolkit for Containers (MTC) 1.7.4 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20226429 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat Advanced Cluster Management 2.4.5 security updates and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225201 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat Advanced Cluster Management 2.3.11 security updates and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225392 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat OpenShift Data Foundation 4.13.0 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20233742 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Service Telemetry Framework 1.4 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225924 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 4.11.0 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225069 - Security Advisory

Trust: 0.1

title:SSZipArchiveurl:https://github.com/ZipArchive/ZipArchive

Trust: 0.1

title:UnityReleaseNotesurl:https://github.com/mario206/UnityReleaseNotes

Trust: 0.1

title:zlib-patch-demourl:https://github.com/chainguard-dev/zlib-patch-demo

Trust: 0.1

title:ReptileIndexOfProjecturl:https://github.com/Webb-L/reptileIndexOfProject

Trust: 0.1

title:UnityReleaseNotesurl:https://github.com/mario206/UnityReleaseNotes-latest

Trust: 0.1

title:snyk-to-cveurl:https://github.com/yeforriak/snyk-to-cve

Trust: 0.1

title:GitHub Actions CI App Pipelineurl:https://github.com/isgo-golgo13/gokit-gorillakit-enginesvc

Trust: 0.1

title:veracode-container-security-finding-parserurl:https://github.com/vincent-deng/veracode-container-security-finding-parser

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2022/03/30/zlib_data_bug/

Trust: 0.1

sources: VULMON: CVE-2018-25032 // JVNDB: JVNDB-2022-001952

EXTERNAL IDS

db:NVDid:CVE-2018-25032

Trust: 3.6

db:OPENWALLid:OSS-SECURITY/2022/03/28/3

Trust: 1.2

db:OPENWALLid:OSS-SECURITY/2022/03/26/1

Trust: 1.2

db:OPENWALLid:OSS-SECURITY/2022/03/28/1

Trust: 1.2

db:OPENWALLid:OSS-SECURITY/2022/03/24/1

Trust: 1.2

db:OPENWALLid:OSS-SECURITY/2022/03/25/2

Trust: 1.2

db:SIEMENSid:SSA-333517

Trust: 1.2

db:ICS CERTid:ICSA-23-166-10

Trust: 0.8

db:ICS CERTid:ICSA-23-080-07

Trust: 0.8

db:ICS CERTid:ICSA-23-075-01

Trust: 0.8

db:JVNid:JVNVU99464755

Trust: 0.8

db:JVNid:JVNVU99752892

Trust: 0.8

db:JVNDBid:JVNDB-2022-001952

Trust: 0.8

db:PACKETSTORMid:168352

Trust: 0.2

db:PACKETSTORMid:167389

Trust: 0.2

db:PACKETSTORMid:168036

Trust: 0.2

db:PACKETSTORMid:167364

Trust: 0.2

db:PACKETSTORMid:167594

Trust: 0.2

db:PACKETSTORMid:167591

Trust: 0.2

db:PACKETSTORMid:168011

Trust: 0.2

db:PACKETSTORMid:166552

Trust: 0.1

db:PACKETSTORMid:167133

Trust: 0.1

db:PACKETSTORMid:168042

Trust: 0.1

db:PACKETSTORMid:166967

Trust: 0.1

db:PACKETSTORMid:167327

Trust: 0.1

db:PACKETSTORMid:167391

Trust: 0.1

db:PACKETSTORMid:167381

Trust: 0.1

db:PACKETSTORMid:167122

Trust: 0.1

db:PACKETSTORMid:167400

Trust: 0.1

db:PACKETSTORMid:167956

Trust: 0.1

db:PACKETSTORMid:167088

Trust: 0.1

db:PACKETSTORMid:167142

Trust: 0.1

db:PACKETSTORMid:167346

Trust: 0.1

db:PACKETSTORMid:171157

Trust: 0.1

db:PACKETSTORMid:167225

Trust: 0.1

db:PACKETSTORMid:169897

Trust: 0.1

db:PACKETSTORMid:167140

Trust: 0.1

db:PACKETSTORMid:168696

Trust: 0.1

db:PACKETSTORMid:167008

Trust: 0.1

db:PACKETSTORMid:167602

Trust: 0.1

db:PACKETSTORMid:167277

Trust: 0.1

db:PACKETSTORMid:167330

Trust: 0.1

db:PACKETSTORMid:169782

Trust: 0.1

db:PACKETSTORMid:167485

Trust: 0.1

db:PACKETSTORMid:166946

Trust: 0.1

db:PACKETSTORMid:167679

Trust: 0.1

db:PACKETSTORMid:167334

Trust: 0.1

db:PACKETSTORMid:167116

Trust: 0.1

db:PACKETSTORMid:166563

Trust: 0.1

db:PACKETSTORMid:166555

Trust: 0.1

db:PACKETSTORMid:167223

Trust: 0.1

db:PACKETSTORMid:170003

Trust: 0.1

db:PACKETSTORMid:167555

Trust: 0.1

db:PACKETSTORMid:167224

Trust: 0.1

db:PACKETSTORMid:167568

Trust: 0.1

db:PACKETSTORMid:167260

Trust: 0.1

db:PACKETSTORMid:167134

Trust: 0.1

db:PACKETSTORMid:167461

Trust: 0.1

db:PACKETSTORMid:171152

Trust: 0.1

db:PACKETSTORMid:167188

Trust: 0.1

db:PACKETSTORMid:167271

Trust: 0.1

db:PACKETSTORMid:167936

Trust: 0.1

db:PACKETSTORMid:167138

Trust: 0.1

db:PACKETSTORMid:167189

Trust: 0.1

db:PACKETSTORMid:167586

Trust: 0.1

db:PACKETSTORMid:167186

Trust: 0.1

db:PACKETSTORMid:167281

Trust: 0.1

db:PACKETSTORMid:169624

Trust: 0.1

db:PACKETSTORMid:167470

Trust: 0.1

db:PACKETSTORMid:167265

Trust: 0.1

db:PACKETSTORMid:166970

Trust: 0.1

db:PACKETSTORMid:168392

Trust: 0.1

db:PACKETSTORMid:167119

Trust: 0.1

db:PACKETSTORMid:167136

Trust: 0.1

db:PACKETSTORMid:167674

Trust: 0.1

db:PACKETSTORMid:167622

Trust: 0.1

db:PACKETSTORMid:167124

Trust: 0.1

db:PACKETSTORMid:167486

Trust: 0.1

db:VULHUBid:VHN-418557

Trust: 0.1

db:ICS CERTid:ICSA-23-348-10

Trust: 0.1

db:VULMONid:CVE-2018-25032

Trust: 0.1

db:PACKETSTORMid:178769

Trust: 0.1

sources: VULHUB: VHN-418557 // VULMON: CVE-2018-25032 // JVNDB: JVNDB-2022-001952 // PACKETSTORM: 167389 // PACKETSTORM: 168036 // PACKETSTORM: 168011 // PACKETSTORM: 167594 // PACKETSTORM: 167364 // PACKETSTORM: 167591 // PACKETSTORM: 168352 // PACKETSTORM: 178769 // NVD: CVE-2018-25032

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2018-25032

Trust: 1.6

url:https://www.debian.org/security/2022/dsa-5111

Trust: 1.3

url:https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf

Trust: 1.2

url:https://security.netapp.com/advisory/ntap-20220729-0004/

Trust: 1.2

url:https://github.com/madler/zlib/compare/v1.2.11...v1.2.12

Trust: 1.2

url:https://security.netapp.com/advisory/ntap-20220526-0009/

Trust: 1.2

url:https://support.apple.com/kb/ht213255

Trust: 1.2

url:https://support.apple.com/kb/ht213256

Trust: 1.2

url:https://support.apple.com/kb/ht213257

Trust: 1.2

url:http://seclists.org/fulldisclosure/2022/may/38

Trust: 1.2

url:http://seclists.org/fulldisclosure/2022/may/35

Trust: 1.2

url:http://seclists.org/fulldisclosure/2022/may/33

Trust: 1.2

url:https://security.gentoo.org/glsa/202210-42

Trust: 1.2

url:https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531

Trust: 1.2

url:https://github.com/madler/zlib/issues/605

Trust: 1.2

url:https://www.openwall.com/lists/oss-security/2022/03/24/1

Trust: 1.2

url:https://www.openwall.com/lists/oss-security/2022/03/28/1

Trust: 1.2

url:https://www.openwall.com/lists/oss-security/2022/03/28/3

Trust: 1.2

url:https://www.oracle.com/security-alerts/cpujul2022.html

Trust: 1.2

url:https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html

Trust: 1.2

url:https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html

Trust: 1.2

url:https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html

Trust: 1.2

url:http://www.openwall.com/lists/oss-security/2022/03/25/2

Trust: 1.2

url:http://www.openwall.com/lists/oss-security/2022/03/26/1

Trust: 1.2

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ns2d2gfpfgojul4wq3duay7hf4vwq77f/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/xokfmsnq5d5wgmalbnbxu3ge442v74wu/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/voknp2l734ael47nrygvzikefoubqy5y/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/df62mvmh3qugmbdcb3dy2erq6ebhtadb/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/jzzptwryqulaol3aw7rzjnvz2uonxcv4/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/dczfijbjtz7cl5qxbfktq22q26vinruf/

Trust: 1.1

url:https://jvn.jp/vu/jvnvu99752892/

Trust: 0.8

url:http://jvn.jp/vu/jvnvu99464755/index.html

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-01

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-07

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-10

Trust: 0.8

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.7

url:https://access.redhat.com/security/team/contact/

Trust: 0.7

url:https://bugzilla.redhat.com/):

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2018-25032

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2022-1271

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-4189

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3634

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3737

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-25219

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-24407

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-1271

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-36084

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-36085

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-20838

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20095

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-5827

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-17595

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-5827

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3580

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24370

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-13435

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-25313

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-29824

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-19603

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-13750

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-23177

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-17594

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-14155

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-13751

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-19603

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-42771

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-20838

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-13750

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-36087

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20231

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-40528

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-13751

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20232

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-31566

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-17594

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-25314

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-17595

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-18218

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-36086

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-18218

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-24370

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-14155

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-28493

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-13435

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0778

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-30631

Trust: 0.2

url:https://issues.jboss.org/):

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1154

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-23222

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-23222

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1154

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3672

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3737

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-25219

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3634

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-4189

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3672

Trust: 0.2

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/voknp2l734ael47nrygvzikefoubqy5y/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/jzzptwryqulaol3aw7rzjnvz2uonxcv4/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ns2d2gfpfgojul4wq3duay7hf4vwq77f/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/df62mvmh3qugmbdcb3dy2erq6ebhtadb/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/dczfijbjtz7cl5qxbfktq22q26vinruf/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/xokfmsnq5d5wgmalbnbxu3ge442v74wu/

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://github.com/ziparchive/ziparchive

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-348-10

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:4584

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28327

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-27776

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5068

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-27774

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1629

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-38561

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24921

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-27191

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29162

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23772

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1621

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-27782

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21698

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-22576

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1706

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-18874

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-28493

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18874

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23806

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1729

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5070

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24903

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23773

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24675

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3867

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9805

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3894

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3899

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-30761

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8743

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-14502

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8743

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8823

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-10228

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000858

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3900

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9894

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33938

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27618

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8782

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-10228

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8771

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9952

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8846

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9915

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8783

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8625

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3326

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8813

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9806

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3885

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9802

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20305

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8764

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22946

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8769

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8710

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000858

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10018

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9895

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8811

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8710

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-14502

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15358

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8819

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3862

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13050

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3868

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29361

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-9169

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3895

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3865

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3518

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33930

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14391

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3864

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9862

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3541

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33929

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29362

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8835

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14889

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8816

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8927

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3897

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8808

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13627

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3520

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20454

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8625

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-27218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22947

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8766

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11793

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9803

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3521

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9850

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-25013

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3537

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-30666

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3517

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33928

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8820

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9893

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23852

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14889

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1730

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8844

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3516

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3902

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5924

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8814

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13434

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8812

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-25013

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8815

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9843

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20454

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3901

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8720

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-30762

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13050

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13627

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29363

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9925

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15503

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8720

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-31036

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-31034

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5187

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-31035

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-31034

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-31016

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-31035

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-31016

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-31036

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-41190

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-41190

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-23820

Trust: 0.1

url:https://docs.openshift.com/acs/3.69/release_notes/370-release-notes.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:4880

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-23820

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5188

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1902

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1902

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15586

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8559

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30629

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1586

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1785

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1897

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1927

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2526

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29154

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0691

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2097

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-28500

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2068

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0686

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-32206

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-32208

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-16845

Trust: 0.1

url:https://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-23337

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1292

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0639

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:6429

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-16845

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0512

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15586

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1650

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-37434

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6736-2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9840

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/klibc/2.0.13-4ubuntu0.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6736-1

Trust: 0.1

sources: VULHUB: VHN-418557 // VULMON: CVE-2018-25032 // JVNDB: JVNDB-2022-001952 // PACKETSTORM: 167389 // PACKETSTORM: 168036 // PACKETSTORM: 168011 // PACKETSTORM: 167594 // PACKETSTORM: 167364 // PACKETSTORM: 167591 // PACKETSTORM: 168352 // PACKETSTORM: 178769 // NVD: CVE-2018-25032

CREDITS

Red Hat

Trust: 0.7

sources: PACKETSTORM: 167389 // PACKETSTORM: 168036 // PACKETSTORM: 168011 // PACKETSTORM: 167594 // PACKETSTORM: 167364 // PACKETSTORM: 167591 // PACKETSTORM: 168352

SOURCES

db:VULHUBid:VHN-418557
db:VULMONid:CVE-2018-25032
db:JVNDBid:JVNDB-2022-001952
db:PACKETSTORMid:167389
db:PACKETSTORMid:168036
db:PACKETSTORMid:168011
db:PACKETSTORMid:167594
db:PACKETSTORMid:167364
db:PACKETSTORMid:167591
db:PACKETSTORMid:168352
db:PACKETSTORMid:178769
db:NVDid:CVE-2018-25032

LAST UPDATE DATE

2024-09-17T20:46:45.742000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-418557date:2023-02-11T00:00:00
db:VULMONid:CVE-2018-25032date:2023-11-07T00:00:00
db:JVNDBid:JVNDB-2022-001952date:2023-06-16T09:26:00
db:NVDid:CVE-2018-25032date:2023-11-07T02:56:26.393

SOURCES RELEASE DATE

db:VULHUBid:VHN-418557date:2022-03-25T00:00:00
db:VULMONid:CVE-2018-25032date:2022-03-25T00:00:00
db:JVNDBid:JVNDB-2022-001952date:2022-06-14T00:00:00
db:PACKETSTORMid:167389date:2022-06-03T16:00:09
db:PACKETSTORMid:168036date:2022-08-10T15:54:58
db:PACKETSTORMid:168011date:2022-08-09T14:36:05
db:PACKETSTORMid:167594date:2022-06-27T16:44:20
db:PACKETSTORMid:167364date:2022-06-02T14:00:26
db:PACKETSTORMid:167591date:2022-06-27T16:41:09
db:PACKETSTORMid:168352date:2022-09-13T15:42:14
db:PACKETSTORMid:178769date:2024-05-23T14:19:29
db:NVDid:CVE-2018-25032date:2022-03-25T09:15:08.187