DEBIAN-CVE-2022-37434
Advisory lineage Upstream: 1 Downstream: 2
Upstream
Downstream
Published: 05 Aug 2022, 07:15
Last modified:17 Mar 2026, 02:47
Vulnerability Summary
Overall Risk (default)
high
70/100 CVSS Score
9.8 CRITICAL
3.1 (osv_debian)
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
05 Aug 2022, 07:15
Published
Vulnerability first disclosed
17 Mar 2026, 02:47
Last Modified
Vulnerability information updated
Description
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
CVSS Metrics
- v3.1•CRITICAL•Score: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Systems
- debian•libz-mingw-w64
all | < 1.2.12+dfsg-2 | < 1.2.12+dfsg-2 | < 1.2.12+dfsg-2
- debian•zlib
< 1:1.2.11.dfsg-2+deb11u2 | < 1:1.2.11.dfsg-4.1 | < 1:1.2.11.dfsg-4.1 | < 1:1.2.11.dfsg-4.1