Medium
Canonical Ubuntu
Evgeny Legerov discovered that zlib incorrectly handled memory when performing certain inflate operations. An attacker could use this issue to cause zlib to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run sudo ua fix USN-5570-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libx32z1-dev – 1:1.2.8.dfsg-2ubuntu4.3+esm2 lib64z1 – 1:1.2.8.dfsg-2ubuntu4.3+esm2 libx32z1 – 1:1.2.8.dfsg-2ubuntu4.3+esm2 lib64z1-dev – 1:1.2.8.dfsg-2ubuntu4.3+esm2 lib32z1 – 1:1.2.8.dfsg-2ubuntu4.3+esm2 zlib1g – 1:1.2.8.dfsg-2ubuntu4.3+esm2 lib32z1-dev – 1:1.2.8.dfsg-2ubuntu4.3+esm2 zlib1g-dev – 1:1.2.8.dfsg-2ubuntu4.3+esm2 Available with UA Infra or UA Desktop: https://ubuntu.com/advantage
CVEs contained in this USN include: CVE-2022-37434.
Severity is medium unless otherwise noted.
Users of affected products are strongly encouraged to follow the mitigations below.
The Cloud Foundry project recommends upgrading the following releases:
2022-08-25: Initial vulnerability report published.
CPE | Name | Operator | Version |
---|---|---|---|
bionic stemcells | lt | 1.97 | |
cflinuxfs3 | lt | 0.316.0 |