CVE-2018-25032

high

Description

zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.

References

https://www.oracle.com/security-alerts/cpujul2022.html

https://www.openwall.com/lists/oss-security/2022/03/28/3

https://www.openwall.com/lists/oss-security/2022/03/24/1

https://www.debian.org/security/2022/dsa-5111

https://support.apple.com/kb/HT213257

https://support.apple.com/kb/HT213256

https://support.apple.com/kb/HT213255

https://security.netapp.com/advisory/ntap-20220729-0004/

https://security.netapp.com/advisory/ntap-20220526-0009/

https://security.gentoo.org/glsa/202210-42

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/

https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html

https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html

https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html

https://github.com/madler/zlib/issues/605

https://github.com/madler/zlib/compare/v1.2.11...v1.2.12

https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531

https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf

http://www.openwall.com/lists/oss-security/2022/03/25/2

http://seclists.org/fulldisclosure/2022/May/38

http://seclists.org/fulldisclosure/2022/May/35

http://seclists.org/fulldisclosure/2022/May/33

Details

Source: Mitre, NVD

Published: 2022-03-25

Updated: 2025-05-06

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Severity: High

EPSS

EPSS: 0.00075

OSZAR »