Description
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
Published: 2022-03-25
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-2968-1 zlib security update
Debian DLA Debian DLA DLA-2993-1 libz-mingw-w64 security update
Debian DLA Debian DLA DLA-3114-1 mariadb-10.3 security update
Debian DSA Debian DSA DSA-5111-1 zlib security update
EUVD EUVD EUVD-2022-1454 zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
Github GHSA Github GHSA GHSA-jc36-42cf-vqwj Nokogiri affected by zlib's Out-of-bounds Write vulnerability
Ubuntu USN Ubuntu USN USN-5355-1 zlib vulnerability
Ubuntu USN Ubuntu USN USN-5355-2 zlib vulnerability
Ubuntu USN Ubuntu USN USN-5359-1 rsync vulnerability
Ubuntu USN Ubuntu USN USN-5359-2 rsync vulnerability
Ubuntu USN Ubuntu USN USN-5739-1 MariaDB vulnerabilities
Ubuntu USN Ubuntu USN USN-6736-1 klibc vulnerabilities
Ubuntu USN Ubuntu USN USN-6736-2 klibc vulnerabilities
References
Link Providers
http://seclists.org/fulldisclosure/2022/May/33 cve-icon cve-icon
http://seclists.org/fulldisclosure/2022/May/35 cve-icon cve-icon
http://seclists.org/fulldisclosure/2022/May/38 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2022/03/25/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2022/03/26/1 cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf cve-icon cve-icon
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531 cve-icon cve-icon
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12 cve-icon cve-icon
https://github.com/madler/zlib/issues/605 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2018-25032 cve-icon
https://security.gentoo.org/glsa/202210-42 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20220526-0009/ cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20220729-0004/ cve-icon cve-icon
https://support.apple.com/kb/HT213255 cve-icon cve-icon
https://support.apple.com/kb/HT213256 cve-icon cve-icon
https://support.apple.com/kb/HT213257 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2018-25032 cve-icon
https://www.debian.org/security/2022/dsa-5111 cve-icon cve-icon
https://www.openwall.com/lists/oss-security/2022/03/24/1 cve-icon cve-icon
https://www.openwall.com/lists/oss-security/2022/03/28/1 cve-icon cve-icon
https://www.openwall.com/lists/oss-security/2022/03/28/3 cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujul2022.html cve-icon cve-icon
History

Thu, 21 Aug 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
CPEs cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows

Tue, 06 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 28 Mar 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Nokogiri
Nokogiri nokogiri
CPEs cpe:2.3:a:nokogiri:nokogiri:*:*:*:*:*:ruby:*:*
Vendors & Products Nokogiri
Nokogiri nokogiri

Subscriptions

Apple Mac Os X Macos
Azul Zulu
Debian Debian Linux
Fedoraproject Fedora
Goto Gotoassist
Mariadb Mariadb
Microsoft Windows
Netapp Active Iq Unified Manager E-series Santricity Os Controller H300s H300s Firmware H410c H410c Firmware H410s H410s Firmware H500s H500s Firmware H700s H700s Firmware Hci Compute Node Management Services For Element Software Oncommand Workflow Automation Ontap Select Deploy Administration Utility
Nokogiri Nokogiri
Python Python
Redhat Enterprise Linux Jboss Core Services Rhel Aus Rhel E4s Rhel Els Rhel Eus Rhel Tus Rhev Hypervisor
Siemens Scalance Sc622-2c Scalance Sc622-2c Firmware Scalance Sc626-2c Scalance Sc626-2c Firmware Scalance Sc632-2c Scalance Sc632-2c Firmware Scalance Sc636-2c Scalance Sc636-2c Firmware Scalance Sc642-2c Scalance Sc642-2c Firmware Scalance Sc646-2c Scalance Sc646-2c Firmware
Zlib Zlib
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-05-06T14:19:53.894Z

Reserved: 2022-03-25T00:00:00.000Z

Link: CVE-2018-25032

cve-icon Vulnrichment

Updated: 2024-08-05T12:26:39.599Z

cve-icon NVD

Status : Analyzed

Published: 2022-03-25T09:15:08.187

Modified: 2025-08-21T20:37:11.840

Link: CVE-2018-25032

cve-icon Redhat

Severity : Important

Publid Date: 2018-04-20T00:00:00Z

Links: CVE-2018-25032 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses