Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:7314: Red Hat Security Advisory: zlib security update

An update for zlib is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-37434: zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field
Red Hat Security Data
#vulnerability#linux#red_hat#buffer_overflow#ibm#sap#ssl

Synopsis

Moderate: zlib security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for zlib is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The zlib packages provide a general-purpose lossless data compression library that is used by many different programs.

Security Fix(es):

  • zlib: a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field (CVE-2022-37434)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
  • Red Hat CodeReady Linux Builder for x86_64 9 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
  • Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
  • Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x

Fixes

  • BZ - 2116639 - CVE-2022-37434 zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/security/updates/classification#moderate

Red Hat Enterprise Linux for x86_64 9

SRPM

zlib-1.2.11-32.el9_0.src.rpm

SHA-256: a475e5a24f4f7bb9a530994d71475ca005a94901ff1328a8af460173bd68d033

x86_64

minizip-compat-debuginfo-1.2.11-32.el9_0.i686.rpm

SHA-256: ec3e903ded816daffa34f248740cce979b7112dffdc0382af2ca2b2504cf9a24

minizip-compat-debuginfo-1.2.11-32.el9_0.i686.rpm

SHA-256: ec3e903ded816daffa34f248740cce979b7112dffdc0382af2ca2b2504cf9a24

minizip-compat-debuginfo-1.2.11-32.el9_0.x86_64.rpm

SHA-256: b03636b4812ddf6dd735a70f7e03c978da91074b9d2cf4ec006571f3dbfb8093

minizip-compat-debuginfo-1.2.11-32.el9_0.x86_64.rpm

SHA-256: b03636b4812ddf6dd735a70f7e03c978da91074b9d2cf4ec006571f3dbfb8093

zlib-1.2.11-32.el9_0.i686.rpm

SHA-256: 20976fe634edca19868af30f0602c3229f90fbbe3c562294af9a706086c8a471

zlib-1.2.11-32.el9_0.x86_64.rpm

SHA-256: 96375c9b17e1d222a3fe76f20e4780d37818a6ab8816040df2e481d90ccc1683

zlib-debuginfo-1.2.11-32.el9_0.i686.rpm

SHA-256: f691686d2d2c9fa1b6b01300d9b341a01441e615d3997786dcf5dc392de545a1

zlib-debuginfo-1.2.11-32.el9_0.i686.rpm

SHA-256: f691686d2d2c9fa1b6b01300d9b341a01441e615d3997786dcf5dc392de545a1

zlib-debuginfo-1.2.11-32.el9_0.x86_64.rpm

SHA-256: fa81580174c1c676c2ec14942b443cb8a984ed70bfaf975e92c3dc3d1c00967c

zlib-debuginfo-1.2.11-32.el9_0.x86_64.rpm

SHA-256: fa81580174c1c676c2ec14942b443cb8a984ed70bfaf975e92c3dc3d1c00967c

zlib-debugsource-1.2.11-32.el9_0.i686.rpm

SHA-256: a4d1f46f076492a92f1410ac6b07b5e1e6dce87155da14077982c1247c942ddd

zlib-debugsource-1.2.11-32.el9_0.i686.rpm

SHA-256: a4d1f46f076492a92f1410ac6b07b5e1e6dce87155da14077982c1247c942ddd

zlib-debugsource-1.2.11-32.el9_0.x86_64.rpm

SHA-256: 40c16d6af07a2a860c6c0f6223681a64832bddaf01b393b272669862833b6fcb

zlib-debugsource-1.2.11-32.el9_0.x86_64.rpm

SHA-256: 40c16d6af07a2a860c6c0f6223681a64832bddaf01b393b272669862833b6fcb

zlib-devel-1.2.11-32.el9_0.i686.rpm

SHA-256: e41162e5fc6a6e8602b982213f004a203607da0c7ccb7c5bf9082c3a672e6314

zlib-devel-1.2.11-32.el9_0.x86_64.rpm

SHA-256: e46f72b79683b5965ea52c937f9d1444301e6a7071af0a7565fe13743a00fe5c

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0

SRPM

zlib-1.2.11-32.el9_0.src.rpm

SHA-256: a475e5a24f4f7bb9a530994d71475ca005a94901ff1328a8af460173bd68d033

x86_64

minizip-compat-debuginfo-1.2.11-32.el9_0.i686.rpm

SHA-256: ec3e903ded816daffa34f248740cce979b7112dffdc0382af2ca2b2504cf9a24

minizip-compat-debuginfo-1.2.11-32.el9_0.i686.rpm

SHA-256: ec3e903ded816daffa34f248740cce979b7112dffdc0382af2ca2b2504cf9a24

minizip-compat-debuginfo-1.2.11-32.el9_0.x86_64.rpm

SHA-256: b03636b4812ddf6dd735a70f7e03c978da91074b9d2cf4ec006571f3dbfb8093

minizip-compat-debuginfo-1.2.11-32.el9_0.x86_64.rpm

SHA-256: b03636b4812ddf6dd735a70f7e03c978da91074b9d2cf4ec006571f3dbfb8093

zlib-1.2.11-32.el9_0.i686.rpm

SHA-256: 20976fe634edca19868af30f0602c3229f90fbbe3c562294af9a706086c8a471

zlib-1.2.11-32.el9_0.x86_64.rpm

SHA-256: 96375c9b17e1d222a3fe76f20e4780d37818a6ab8816040df2e481d90ccc1683

zlib-debuginfo-1.2.11-32.el9_0.i686.rpm

SHA-256: f691686d2d2c9fa1b6b01300d9b341a01441e615d3997786dcf5dc392de545a1

zlib-debuginfo-1.2.11-32.el9_0.i686.rpm

SHA-256: f691686d2d2c9fa1b6b01300d9b341a01441e615d3997786dcf5dc392de545a1

zlib-debuginfo-1.2.11-32.el9_0.x86_64.rpm

SHA-256: fa81580174c1c676c2ec14942b443cb8a984ed70bfaf975e92c3dc3d1c00967c

zlib-debuginfo-1.2.11-32.el9_0.x86_64.rpm

SHA-256: fa81580174c1c676c2ec14942b443cb8a984ed70bfaf975e92c3dc3d1c00967c

zlib-debugsource-1.2.11-32.el9_0.i686.rpm

SHA-256: a4d1f46f076492a92f1410ac6b07b5e1e6dce87155da14077982c1247c942ddd

zlib-debugsource-1.2.11-32.el9_0.i686.rpm

SHA-256: a4d1f46f076492a92f1410ac6b07b5e1e6dce87155da14077982c1247c942ddd

zlib-debugsource-1.2.11-32.el9_0.x86_64.rpm

SHA-256: 40c16d6af07a2a860c6c0f6223681a64832bddaf01b393b272669862833b6fcb

zlib-debugsource-1.2.11-32.el9_0.x86_64.rpm

SHA-256: 40c16d6af07a2a860c6c0f6223681a64832bddaf01b393b272669862833b6fcb

zlib-devel-1.2.11-32.el9_0.i686.rpm

SHA-256: e41162e5fc6a6e8602b982213f004a203607da0c7ccb7c5bf9082c3a672e6314

zlib-devel-1.2.11-32.el9_0.x86_64.rpm

SHA-256: e46f72b79683b5965ea52c937f9d1444301e6a7071af0a7565fe13743a00fe5c

Red Hat Enterprise Linux for IBM z Systems 9

SRPM

zlib-1.2.11-32.el9_0.src.rpm

SHA-256: a475e5a24f4f7bb9a530994d71475ca005a94901ff1328a8af460173bd68d033

s390x

minizip-compat-debuginfo-1.2.11-32.el9_0.s390x.rpm

SHA-256: 9779b67972af853ec49d16fbbf3d2038cedfe8dd67e1b9c04d7d9f90f004aed9

minizip-compat-debuginfo-1.2.11-32.el9_0.s390x.rpm

SHA-256: 9779b67972af853ec49d16fbbf3d2038cedfe8dd67e1b9c04d7d9f90f004aed9

zlib-1.2.11-32.el9_0.s390x.rpm

SHA-256: f92fba32465649b02e13b2c43c2dcdfa0ccf80fa0067018e48bf54c50436e324

zlib-debuginfo-1.2.11-32.el9_0.s390x.rpm

SHA-256: b4b56f0a810045d74e09f2d3131a7bb6cc960f8170b701f68a29dfc16ab65ae3

zlib-debuginfo-1.2.11-32.el9_0.s390x.rpm

SHA-256: b4b56f0a810045d74e09f2d3131a7bb6cc960f8170b701f68a29dfc16ab65ae3

zlib-debugsource-1.2.11-32.el9_0.s390x.rpm

SHA-256: 8a604035b6b287e3ac1e3da127d408107495edb551b63f8eba4c6cde6d081d0b

zlib-debugsource-1.2.11-32.el9_0.s390x.rpm

SHA-256: 8a604035b6b287e3ac1e3da127d408107495edb551b63f8eba4c6cde6d081d0b

zlib-devel-1.2.11-32.el9_0.s390x.rpm

SHA-256: 99be37c959034c9a69e15669db13da8277d18c79ceae496470a73603e9478f10

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0

SRPM

zlib-1.2.11-32.el9_0.src.rpm

SHA-256: a475e5a24f4f7bb9a530994d71475ca005a94901ff1328a8af460173bd68d033

s390x

minizip-compat-debuginfo-1.2.11-32.el9_0.s390x.rpm

SHA-256: 9779b67972af853ec49d16fbbf3d2038cedfe8dd67e1b9c04d7d9f90f004aed9

minizip-compat-debuginfo-1.2.11-32.el9_0.s390x.rpm

SHA-256: 9779b67972af853ec49d16fbbf3d2038cedfe8dd67e1b9c04d7d9f90f004aed9

zlib-1.2.11-32.el9_0.s390x.rpm

SHA-256: f92fba32465649b02e13b2c43c2dcdfa0ccf80fa0067018e48bf54c50436e324

zlib-debuginfo-1.2.11-32.el9_0.s390x.rpm

SHA-256: b4b56f0a810045d74e09f2d3131a7bb6cc960f8170b701f68a29dfc16ab65ae3

zlib-debuginfo-1.2.11-32.el9_0.s390x.rpm

SHA-256: b4b56f0a810045d74e09f2d3131a7bb6cc960f8170b701f68a29dfc16ab65ae3

zlib-debugsource-1.2.11-32.el9_0.s390x.rpm

SHA-256: 8a604035b6b287e3ac1e3da127d408107495edb551b63f8eba4c6cde6d081d0b

zlib-debugsource-1.2.11-32.el9_0.s390x.rpm

SHA-256: 8a604035b6b287e3ac1e3da127d408107495edb551b63f8eba4c6cde6d081d0b

zlib-devel-1.2.11-32.el9_0.s390x.rpm

SHA-256: 99be37c959034c9a69e15669db13da8277d18c79ceae496470a73603e9478f10

Red Hat Enterprise Linux for Power, little endian 9

SRPM

zlib-1.2.11-32.el9_0.src.rpm

SHA-256: a475e5a24f4f7bb9a530994d71475ca005a94901ff1328a8af460173bd68d033

ppc64le

minizip-compat-debuginfo-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: da64ea7d60f72cb3d2dd0657471a14cb3df7f5ee4e0d063d65c191e884465685

minizip-compat-debuginfo-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: da64ea7d60f72cb3d2dd0657471a14cb3df7f5ee4e0d063d65c191e884465685

zlib-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 2ccf9299b5cb25902108e796b15b643f3b287dc80cd2f25e3754b142d97423d2

zlib-debuginfo-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 775afd59dce872f779068aea70e09a7a36613a3436487f9f94779e5e62371700

zlib-debuginfo-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 775afd59dce872f779068aea70e09a7a36613a3436487f9f94779e5e62371700

zlib-debugsource-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 1553eb18c588c677908d9d7e587c532c7fd7ccd152a5f12b535ac11f72fd718f

zlib-debugsource-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 1553eb18c588c677908d9d7e587c532c7fd7ccd152a5f12b535ac11f72fd718f

zlib-devel-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: aa91ec6d8cfc1be22dea11aed62d9b1e6f0fce62e8641c0badb5f90dfefe648f

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0

SRPM

zlib-1.2.11-32.el9_0.src.rpm

SHA-256: a475e5a24f4f7bb9a530994d71475ca005a94901ff1328a8af460173bd68d033

ppc64le

minizip-compat-debuginfo-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: da64ea7d60f72cb3d2dd0657471a14cb3df7f5ee4e0d063d65c191e884465685

minizip-compat-debuginfo-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: da64ea7d60f72cb3d2dd0657471a14cb3df7f5ee4e0d063d65c191e884465685

zlib-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 2ccf9299b5cb25902108e796b15b643f3b287dc80cd2f25e3754b142d97423d2

zlib-debuginfo-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 775afd59dce872f779068aea70e09a7a36613a3436487f9f94779e5e62371700

zlib-debuginfo-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 775afd59dce872f779068aea70e09a7a36613a3436487f9f94779e5e62371700

zlib-debugsource-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 1553eb18c588c677908d9d7e587c532c7fd7ccd152a5f12b535ac11f72fd718f

zlib-debugsource-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 1553eb18c588c677908d9d7e587c532c7fd7ccd152a5f12b535ac11f72fd718f

zlib-devel-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: aa91ec6d8cfc1be22dea11aed62d9b1e6f0fce62e8641c0badb5f90dfefe648f

Red Hat Enterprise Linux for ARM 64 9

SRPM

zlib-1.2.11-32.el9_0.src.rpm

SHA-256: a475e5a24f4f7bb9a530994d71475ca005a94901ff1328a8af460173bd68d033

aarch64

minizip-compat-debuginfo-1.2.11-32.el9_0.aarch64.rpm

SHA-256: a9bfa404dcad14cb14a48a421363524c67404473fd8411929891f17706dcb0a7

minizip-compat-debuginfo-1.2.11-32.el9_0.aarch64.rpm

SHA-256: a9bfa404dcad14cb14a48a421363524c67404473fd8411929891f17706dcb0a7

zlib-1.2.11-32.el9_0.aarch64.rpm

SHA-256: aafdf9bb3522662b23a1106c91609eb2f443fb4081fd682f1e6e5c8af4a9f120

zlib-debuginfo-1.2.11-32.el9_0.aarch64.rpm

SHA-256: 1610c1df536cc5c69edb2222d71596174dc132f3b663202628beb09e584f6d46

zlib-debuginfo-1.2.11-32.el9_0.aarch64.rpm

SHA-256: 1610c1df536cc5c69edb2222d71596174dc132f3b663202628beb09e584f6d46

zlib-debugsource-1.2.11-32.el9_0.aarch64.rpm

SHA-256: b021e322c2f72de97dc96de7c3c5d39b50f8f332bc5edee70fa40b7ab3969a53

zlib-debugsource-1.2.11-32.el9_0.aarch64.rpm

SHA-256: b021e322c2f72de97dc96de7c3c5d39b50f8f332bc5edee70fa40b7ab3969a53

zlib-devel-1.2.11-32.el9_0.aarch64.rpm

SHA-256: 50f40c00f717eddc6ff13312fe0636b612d3431e89222c1b29646c1e40df41d8

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0

SRPM

zlib-1.2.11-32.el9_0.src.rpm

SHA-256: a475e5a24f4f7bb9a530994d71475ca005a94901ff1328a8af460173bd68d033

ppc64le

minizip-compat-debuginfo-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: da64ea7d60f72cb3d2dd0657471a14cb3df7f5ee4e0d063d65c191e884465685

minizip-compat-debuginfo-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: da64ea7d60f72cb3d2dd0657471a14cb3df7f5ee4e0d063d65c191e884465685

zlib-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 2ccf9299b5cb25902108e796b15b643f3b287dc80cd2f25e3754b142d97423d2

zlib-debuginfo-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 775afd59dce872f779068aea70e09a7a36613a3436487f9f94779e5e62371700

zlib-debuginfo-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 775afd59dce872f779068aea70e09a7a36613a3436487f9f94779e5e62371700

zlib-debugsource-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 1553eb18c588c677908d9d7e587c532c7fd7ccd152a5f12b535ac11f72fd718f

zlib-debugsource-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 1553eb18c588c677908d9d7e587c532c7fd7ccd152a5f12b535ac11f72fd718f

zlib-devel-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: aa91ec6d8cfc1be22dea11aed62d9b1e6f0fce62e8641c0badb5f90dfefe648f

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0

SRPM

zlib-1.2.11-32.el9_0.src.rpm

SHA-256: a475e5a24f4f7bb9a530994d71475ca005a94901ff1328a8af460173bd68d033

x86_64

minizip-compat-debuginfo-1.2.11-32.el9_0.i686.rpm

SHA-256: ec3e903ded816daffa34f248740cce979b7112dffdc0382af2ca2b2504cf9a24

minizip-compat-debuginfo-1.2.11-32.el9_0.i686.rpm

SHA-256: ec3e903ded816daffa34f248740cce979b7112dffdc0382af2ca2b2504cf9a24

minizip-compat-debuginfo-1.2.11-32.el9_0.x86_64.rpm

SHA-256: b03636b4812ddf6dd735a70f7e03c978da91074b9d2cf4ec006571f3dbfb8093

minizip-compat-debuginfo-1.2.11-32.el9_0.x86_64.rpm

SHA-256: b03636b4812ddf6dd735a70f7e03c978da91074b9d2cf4ec006571f3dbfb8093

zlib-1.2.11-32.el9_0.i686.rpm

SHA-256: 20976fe634edca19868af30f0602c3229f90fbbe3c562294af9a706086c8a471

zlib-1.2.11-32.el9_0.x86_64.rpm

SHA-256: 96375c9b17e1d222a3fe76f20e4780d37818a6ab8816040df2e481d90ccc1683

zlib-debuginfo-1.2.11-32.el9_0.i686.rpm

SHA-256: f691686d2d2c9fa1b6b01300d9b341a01441e615d3997786dcf5dc392de545a1

zlib-debuginfo-1.2.11-32.el9_0.i686.rpm

SHA-256: f691686d2d2c9fa1b6b01300d9b341a01441e615d3997786dcf5dc392de545a1

zlib-debuginfo-1.2.11-32.el9_0.x86_64.rpm

SHA-256: fa81580174c1c676c2ec14942b443cb8a984ed70bfaf975e92c3dc3d1c00967c

zlib-debuginfo-1.2.11-32.el9_0.x86_64.rpm

SHA-256: fa81580174c1c676c2ec14942b443cb8a984ed70bfaf975e92c3dc3d1c00967c

zlib-debugsource-1.2.11-32.el9_0.i686.rpm

SHA-256: a4d1f46f076492a92f1410ac6b07b5e1e6dce87155da14077982c1247c942ddd

zlib-debugsource-1.2.11-32.el9_0.i686.rpm

SHA-256: a4d1f46f076492a92f1410ac6b07b5e1e6dce87155da14077982c1247c942ddd

zlib-debugsource-1.2.11-32.el9_0.x86_64.rpm

SHA-256: 40c16d6af07a2a860c6c0f6223681a64832bddaf01b393b272669862833b6fcb

zlib-debugsource-1.2.11-32.el9_0.x86_64.rpm

SHA-256: 40c16d6af07a2a860c6c0f6223681a64832bddaf01b393b272669862833b6fcb

zlib-devel-1.2.11-32.el9_0.i686.rpm

SHA-256: e41162e5fc6a6e8602b982213f004a203607da0c7ccb7c5bf9082c3a672e6314

zlib-devel-1.2.11-32.el9_0.x86_64.rpm

SHA-256: e46f72b79683b5965ea52c937f9d1444301e6a7071af0a7565fe13743a00fe5c

Red Hat CodeReady Linux Builder for x86_64 9

SRPM

x86_64

minizip-compat-debuginfo-1.2.11-32.el9_0.i686.rpm

SHA-256: ec3e903ded816daffa34f248740cce979b7112dffdc0382af2ca2b2504cf9a24

minizip-compat-debuginfo-1.2.11-32.el9_0.x86_64.rpm

SHA-256: b03636b4812ddf6dd735a70f7e03c978da91074b9d2cf4ec006571f3dbfb8093

zlib-debuginfo-1.2.11-32.el9_0.i686.rpm

SHA-256: f691686d2d2c9fa1b6b01300d9b341a01441e615d3997786dcf5dc392de545a1

zlib-debuginfo-1.2.11-32.el9_0.x86_64.rpm

SHA-256: fa81580174c1c676c2ec14942b443cb8a984ed70bfaf975e92c3dc3d1c00967c

zlib-debugsource-1.2.11-32.el9_0.i686.rpm

SHA-256: a4d1f46f076492a92f1410ac6b07b5e1e6dce87155da14077982c1247c942ddd

zlib-debugsource-1.2.11-32.el9_0.x86_64.rpm

SHA-256: 40c16d6af07a2a860c6c0f6223681a64832bddaf01b393b272669862833b6fcb

zlib-static-1.2.11-32.el9_0.i686.rpm

SHA-256: 73466ac547d5a252f18bc5f0c85a46834c63284a830234a31521c3a5ee008778

zlib-static-1.2.11-32.el9_0.x86_64.rpm

SHA-256: 3d363aa24cad29c896188c056d21529b2a95cdba5a0a1bc49c9385d3eeb4e2ca

Red Hat CodeReady Linux Builder for Power, little endian 9

SRPM

ppc64le

minizip-compat-debuginfo-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: da64ea7d60f72cb3d2dd0657471a14cb3df7f5ee4e0d063d65c191e884465685

zlib-debuginfo-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 775afd59dce872f779068aea70e09a7a36613a3436487f9f94779e5e62371700

zlib-debugsource-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 1553eb18c588c677908d9d7e587c532c7fd7ccd152a5f12b535ac11f72fd718f

zlib-static-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 10db67355a33c081ecc9d99198923dbf2f3da20682e4306aa2e7aa507bbfc8ec

Red Hat CodeReady Linux Builder for ARM 64 9

SRPM

aarch64

minizip-compat-debuginfo-1.2.11-32.el9_0.aarch64.rpm

SHA-256: a9bfa404dcad14cb14a48a421363524c67404473fd8411929891f17706dcb0a7

zlib-debuginfo-1.2.11-32.el9_0.aarch64.rpm

SHA-256: 1610c1df536cc5c69edb2222d71596174dc132f3b663202628beb09e584f6d46

zlib-debugsource-1.2.11-32.el9_0.aarch64.rpm

SHA-256: b021e322c2f72de97dc96de7c3c5d39b50f8f332bc5edee70fa40b7ab3969a53

zlib-static-1.2.11-32.el9_0.aarch64.rpm

SHA-256: 6ab8761a26fd0af12c2bfc96c32726931ea57e82109e14487d77402c4d3c4b1f

Red Hat CodeReady Linux Builder for IBM z Systems 9

SRPM

s390x

minizip-compat-debuginfo-1.2.11-32.el9_0.s390x.rpm

SHA-256: 9779b67972af853ec49d16fbbf3d2038cedfe8dd67e1b9c04d7d9f90f004aed9

zlib-debuginfo-1.2.11-32.el9_0.s390x.rpm

SHA-256: b4b56f0a810045d74e09f2d3131a7bb6cc960f8170b701f68a29dfc16ab65ae3

zlib-debugsource-1.2.11-32.el9_0.s390x.rpm

SHA-256: 8a604035b6b287e3ac1e3da127d408107495edb551b63f8eba4c6cde6d081d0b

zlib-static-1.2.11-32.el9_0.s390x.rpm

SHA-256: 626c8c506db7aeff3b2a0a0813f201d2411fcea5a100932f4c21130894c9d24b

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0

SRPM

zlib-1.2.11-32.el9_0.src.rpm

SHA-256: a475e5a24f4f7bb9a530994d71475ca005a94901ff1328a8af460173bd68d033

aarch64

minizip-compat-debuginfo-1.2.11-32.el9_0.aarch64.rpm

SHA-256: a9bfa404dcad14cb14a48a421363524c67404473fd8411929891f17706dcb0a7

minizip-compat-debuginfo-1.2.11-32.el9_0.aarch64.rpm

SHA-256: a9bfa404dcad14cb14a48a421363524c67404473fd8411929891f17706dcb0a7

zlib-1.2.11-32.el9_0.aarch64.rpm

SHA-256: aafdf9bb3522662b23a1106c91609eb2f443fb4081fd682f1e6e5c8af4a9f120

zlib-debuginfo-1.2.11-32.el9_0.aarch64.rpm

SHA-256: 1610c1df536cc5c69edb2222d71596174dc132f3b663202628beb09e584f6d46

zlib-debuginfo-1.2.11-32.el9_0.aarch64.rpm

SHA-256: 1610c1df536cc5c69edb2222d71596174dc132f3b663202628beb09e584f6d46

zlib-debugsource-1.2.11-32.el9_0.aarch64.rpm

SHA-256: b021e322c2f72de97dc96de7c3c5d39b50f8f332bc5edee70fa40b7ab3969a53

zlib-debugsource-1.2.11-32.el9_0.aarch64.rpm

SHA-256: b021e322c2f72de97dc96de7c3c5d39b50f8f332bc5edee70fa40b7ab3969a53

zlib-devel-1.2.11-32.el9_0.aarch64.rpm

SHA-256: 50f40c00f717eddc6ff13312fe0636b612d3431e89222c1b29646c1e40df41d8

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0

SRPM

x86_64

minizip-compat-debuginfo-1.2.11-32.el9_0.i686.rpm

SHA-256: ec3e903ded816daffa34f248740cce979b7112dffdc0382af2ca2b2504cf9a24

minizip-compat-debuginfo-1.2.11-32.el9_0.x86_64.rpm

SHA-256: b03636b4812ddf6dd735a70f7e03c978da91074b9d2cf4ec006571f3dbfb8093

zlib-debuginfo-1.2.11-32.el9_0.i686.rpm

SHA-256: f691686d2d2c9fa1b6b01300d9b341a01441e615d3997786dcf5dc392de545a1

zlib-debuginfo-1.2.11-32.el9_0.x86_64.rpm

SHA-256: fa81580174c1c676c2ec14942b443cb8a984ed70bfaf975e92c3dc3d1c00967c

zlib-debugsource-1.2.11-32.el9_0.i686.rpm

SHA-256: a4d1f46f076492a92f1410ac6b07b5e1e6dce87155da14077982c1247c942ddd

zlib-debugsource-1.2.11-32.el9_0.x86_64.rpm

SHA-256: 40c16d6af07a2a860c6c0f6223681a64832bddaf01b393b272669862833b6fcb

zlib-static-1.2.11-32.el9_0.i686.rpm

SHA-256: 73466ac547d5a252f18bc5f0c85a46834c63284a830234a31521c3a5ee008778

zlib-static-1.2.11-32.el9_0.x86_64.rpm

SHA-256: 3d363aa24cad29c896188c056d21529b2a95cdba5a0a1bc49c9385d3eeb4e2ca

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0

SRPM

ppc64le

minizip-compat-debuginfo-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: da64ea7d60f72cb3d2dd0657471a14cb3df7f5ee4e0d063d65c191e884465685

zlib-debuginfo-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 775afd59dce872f779068aea70e09a7a36613a3436487f9f94779e5e62371700

zlib-debugsource-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 1553eb18c588c677908d9d7e587c532c7fd7ccd152a5f12b535ac11f72fd718f

zlib-static-1.2.11-32.el9_0.ppc64le.rpm

SHA-256: 10db67355a33c081ecc9d99198923dbf2f3da20682e4306aa2e7aa507bbfc8ec

Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0

SRPM

s390x

minizip-compat-debuginfo-1.2.11-32.el9_0.s390x.rpm

SHA-256: 9779b67972af853ec49d16fbbf3d2038cedfe8dd67e1b9c04d7d9f90f004aed9

zlib-debuginfo-1.2.11-32.el9_0.s390x.rpm

SHA-256: b4b56f0a810045d74e09f2d3131a7bb6cc960f8170b701f68a29dfc16ab65ae3

zlib-debugsource-1.2.11-32.el9_0.s390x.rpm

SHA-256: 8a604035b6b287e3ac1e3da127d408107495edb551b63f8eba4c6cde6d081d0b

zlib-static-1.2.11-32.el9_0.s390x.rpm

SHA-256: 626c8c506db7aeff3b2a0a0813f201d2411fcea5a100932f4c21130894c9d24b

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0

SRPM

aarch64

minizip-compat-debuginfo-1.2.11-32.el9_0.aarch64.rpm

SHA-256: a9bfa404dcad14cb14a48a421363524c67404473fd8411929891f17706dcb0a7

zlib-debuginfo-1.2.11-32.el9_0.aarch64.rpm

SHA-256: 1610c1df536cc5c69edb2222d71596174dc132f3b663202628beb09e584f6d46

zlib-debugsource-1.2.11-32.el9_0.aarch64.rpm

SHA-256: b021e322c2f72de97dc96de7c3c5d39b50f8f332bc5edee70fa40b7ab3969a53

zlib-static-1.2.11-32.el9_0.aarch64.rpm

SHA-256: 6ab8761a26fd0af12c2bfc96c32726931ea57e82109e14487d77402c4d3c4b1f

Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0

SRPM

zlib-1.2.11-32.el9_0.src.rpm

SHA-256: a475e5a24f4f7bb9a530994d71475ca005a94901ff1328a8af460173bd68d033

aarch64

minizip-compat-debuginfo-1.2.11-32.el9_0.aarch64.rpm

SHA-256: a9bfa404dcad14cb14a48a421363524c67404473fd8411929891f17706dcb0a7

minizip-compat-debuginfo-1.2.11-32.el9_0.aarch64.rpm

SHA-256: a9bfa404dcad14cb14a48a421363524c67404473fd8411929891f17706dcb0a7

zlib-1.2.11-32.el9_0.aarch64.rpm

SHA-256: aafdf9bb3522662b23a1106c91609eb2f443fb4081fd682f1e6e5c8af4a9f120

zlib-debuginfo-1.2.11-32.el9_0.aarch64.rpm

SHA-256: 1610c1df536cc5c69edb2222d71596174dc132f3b663202628beb09e584f6d46

zlib-debuginfo-1.2.11-32.el9_0.aarch64.rpm

SHA-256: 1610c1df536cc5c69edb2222d71596174dc132f3b663202628beb09e584f6d46

zlib-debugsource-1.2.11-32.el9_0.aarch64.rpm

SHA-256: b021e322c2f72de97dc96de7c3c5d39b50f8f332bc5edee70fa40b7ab3969a53

zlib-debugsource-1.2.11-32.el9_0.aarch64.rpm

SHA-256: b021e322c2f72de97dc96de7c3c5d39b50f8f332bc5edee70fa40b7ab3969a53

zlib-devel-1.2.11-32.el9_0.aarch64.rpm

SHA-256: 50f40c00f717eddc6ff13312fe0636b612d3431e89222c1b29646c1e40df41d8

Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0

SRPM

zlib-1.2.11-32.el9_0.src.rpm

SHA-256: a475e5a24f4f7bb9a530994d71475ca005a94901ff1328a8af460173bd68d033

s390x

minizip-compat-debuginfo-1.2.11-32.el9_0.s390x.rpm

SHA-256: 9779b67972af853ec49d16fbbf3d2038cedfe8dd67e1b9c04d7d9f90f004aed9

minizip-compat-debuginfo-1.2.11-32.el9_0.s390x.rpm

SHA-256: 9779b67972af853ec49d16fbbf3d2038cedfe8dd67e1b9c04d7d9f90f004aed9

zlib-1.2.11-32.el9_0.s390x.rpm

SHA-256: f92fba32465649b02e13b2c43c2dcdfa0ccf80fa0067018e48bf54c50436e324

zlib-debuginfo-1.2.11-32.el9_0.s390x.rpm

SHA-256: b4b56f0a810045d74e09f2d3131a7bb6cc960f8170b701f68a29dfc16ab65ae3

zlib-debuginfo-1.2.11-32.el9_0.s390x.rpm

SHA-256: b4b56f0a810045d74e09f2d3131a7bb6cc960f8170b701f68a29dfc16ab65ae3

zlib-debugsource-1.2.11-32.el9_0.s390x.rpm

SHA-256: 8a604035b6b287e3ac1e3da127d408107495edb551b63f8eba4c6cde6d081d0b

zlib-debugsource-1.2.11-32.el9_0.s390x.rpm

SHA-256: 8a604035b6b287e3ac1e3da127d408107495edb551b63f8eba4c6cde6d081d0b

zlib-devel-1.2.11-32.el9_0.s390x.rpm

SHA-256: 99be37c959034c9a69e15669db13da8277d18c79ceae496470a73603e9478f10

Related news

Red Hat Security Advisory 2024-0254-03

Red Hat Security Advisory 2024-0254-03 - An update for rsync is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include a buffer over-read vulnerability.

RHSA-2023:4053: Red Hat Security Advisory: OpenShift Container Platform 4.11.45 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21235: A flaw was found in the VCS package, caused by improper validation of user-supplied input. By using a specially-crafted argument, a remote attacker could execute arbitrary commands o...

RHSA-2023:3742: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.0 security and bug fix update

Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...

RHSA-2023:1095: Red Hat Security Advisory: zlib security update

An update for zlib is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-37434: A security vulnerability was found in zlib. The flaw triggered a heap-based buffer in inflate in the inflate.c function via a large gzip header extra field. This flaw is only applicable in the call inflateGetHeader.

Red Hat Security Advisory 2023-0795-01

Red Hat Security Advisory 2023-0795-01 - Submariner 0.13.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.6.

Red Hat Security Advisory 2023-0542-01

Red Hat Security Advisory 2023-0542-01 - Red Hat OpenShift Service Mesh is the Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. This advisory covers container images for the release. Issues addressed include denial of service and spoofing vulnerabilities.

Red Hat Security Advisory 2023-0470-01

Red Hat Security Advisory 2023-0470-01 - An update is now available for Migration Toolkit for Runtimes (v1.0.1).

Red Hat Security Advisory 2023-0408-01

Red Hat Security Advisory 2023-0408-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. Issues addressed include denial of service and out of bounds read vulnerabilities.

RHSA-2022:9047: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.6 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.6 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions * CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip * CVE-2022-30629: golang: crypto/tls: session tickets lack random ticket_age_add * CVE-2022-30630: golang: io/fs: stack exhaustion in G...

Red Hat Security Advisory 2022-8841-01

Red Hat Security Advisory 2022-8841-01 - Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.51, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include buffer over-read, buffer overflow, bypass, code execution, denial of service, double free, integer overflow, out of bounds read, and use-after-free vulnerabilities.

Red Hat Security Advisory 2022-8781-01

Red Hat Security Advisory 2022-8781-01 - Logging Subsystem for Red Hat OpenShift has a security update. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-8634-01

Red Hat Security Advisory 2022-8634-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes.

Red Hat Security Advisory 2022-7435-01

Red Hat Security Advisory 2022-7435-01 - An update is now available for Logging subsystem for Red Hat OpenShift 5.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-8291-01

Red Hat Security Advisory 2022-8291-01 - The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Issues addressed include a buffer over-read vulnerability.

Red Hat Security Advisory 2022-7434-01

Red Hat Security Advisory 2022-7434-01 - A Red Hat OpenShift security update has been provided for the Logging Subsystem.

RHSA-2022:6882: Red Hat Security Advisory: Openshift Logging 5.3.13 security and bug fix release

An update is now available for OpenShift Logging 5.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32149: golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags

Red Hat Security Advisory 2022-7793-01

Red Hat Security Advisory 2022-7793-01 - The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Issues addressed include a buffer over-read vulnerability.

Red Hat Security Advisory 2022-7407-01

Red Hat Security Advisory 2022-7407-01 - Service Binding Operator 1.3.1 is now available for OpenShift Developer Tools and Services for OCP 4.9 +.

Red Hat Security Advisory 2022-7313-01

Red Hat Security Advisory 2022-7313-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Issues addressed include denial of service and remote SQL injection vulnerabilities.

Red Hat Security Advisory 2022-7314-01

Red Hat Security Advisory 2022-7314-01 - The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Issues addressed include buffer over-read and buffer overflow vulnerabilities.

CVE-2022-26730: About the security content of macOS Ventura 13

A memory corruption issue existed in the processing of ICC profiles. This issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13. Processing a maliciously crafted image may lead to arbitrary code execution.

CVE-2022-32946: About the security content of iOS 16.1 and iPadOS 16

This issue was addressed with improved entitlements. This issue is fixed in iOS 16.1 and iPadOS 16. An app may be able to record audio using a pair of connected AirPods.

Gentoo Linux Security Advisory 202210-42

Gentoo Linux Security Advisory 202210-42 - A buffer overflow in zlib might allow an attacker to cause remote code execution. Versions less than 1.2.12-r3 are affected.

Apple Security Advisory 2022-10-27-12

Apple Security Advisory 2022-10-27-12 - watchOS 9.1 addresses code execution, out of bounds write, and spoofing vulnerabilities.

CVE-2022-36368: IPFire 2.27 - Core Update 170 released - The IPFire Blog

Multiple stored cross-site scripting vulnerabilities in the web user interface of IPFire versions prior to 2.27 allows a remote authenticated attacker with administrative privilege to inject an arbitrary script.

Ubuntu Security Notice USN-5570-2

Ubuntu Security Notice 5570-2 - USN-5570-1 fixed a vulnerability in zlib. This update provides the corresponding update for Ubuntu 22.04 LTS and Ubuntu 20.04 LTS. Evgeny Legerov discovered that zlib incorrectly handled memory when performing certain inflate operations. An attacker could use this issue to cause zlib to crash, resulting in a denial of service, or possibly execute arbitrary code.

CVE-2022-38701: en/security-disclosure/2022/2022-09.md · OpenHarmony/security - Gitee.com

OpenHarmony-v3.1.2 and prior versions have a heap overflow vulnerability. Local attackers can trigger a heap overflow and get network sensitive information.

Ubuntu Security Notice USN-5573-1

Ubuntu Security Notice 5573-1 - Evgeny Legerov discovered that zlib incorrectly handled memory when performing certain inflate operations. An attacker could use this issue to cause rsync to crash, resulting in a denial of service, or possibly execute arbitrary code.

Ubuntu Security Notice USN-5570-1

Ubuntu Security Notice 5570-1 - Evgeny Legerov discovered that zlib incorrectly handled memory when performing certain inflate operations. An attacker could use this issue to cause zlib to crash, resulting in a denial of service, or possibly execute arbitrary code.

CVE-2022-37434: node/inflate.c at 75b68c6e4db515f76df73af476eccf382bbcb00a · nodejs/node

zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).