QID 355132

Date Published: 2023-05-29

QID 355132: Amazon Linux Security Advisory for zlib : ALAS2023-2023-003

An out-of-bounds access flaw was found in zlib, which allows memory corruption when deflating (ex: when compressing) if the input has many distant matches.
For some rare inputs with a large number of distant matches (crafted payloads), the buffer into which the compressed or deflated data is written can overwrite the distance symbol table which it overlays.
This issue results in corrupted output due to invalid distances, which leads to out-of-bound access, corrupting the memory and potentially crashing the application. (
( CVE-2018-25032) a security vulnerability was found in zlib.
The flaw triggered a heap-based buffer in inflate in the inflate.c function via a large gzip header extra field.
This flaw is only applicable in the call inflategetheader. (
( CVE-2022-37434)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2023-2023-003 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 355132

    Software Advisories
    Advisory ID Software Component Link
    ALAS2023-2023-003 amazon linux 2023 URL Logo alas.aws.amazon.com/AL2023/ALAS-2023-003.html