CVE-2022-37434
MySQL vulnerability analysis and mitigation

Overview

zlib through version 1.2.12 contains a heap-based buffer over-read or buffer overflow vulnerability in the inflate function in inflate.c, which can be triggered via a large gzip header extra field. The vulnerability only affects applications that call inflateGetHeader. The issue was discovered by Evgeny Legerov and assigned CVE-2022-37434 (CVE, NVD).

Technical details

The vulnerability occurs when processing gzip headers with large extra fields through multiple calls to inflate(). If the extra field was larger than the space provided by the user with inflateGetHeader(), and if multiple calls of inflate() delivered the extra header data, then there could be a buffer overflow of the provided space. The issue was initially fixed by ensuring provided space is not exceeded, but this caused crashes in some applications like curl. A second fix was implemented to prevent dereferencing state->head until after checking for NULL (Zlib Commit, OSS Security).

Impact

Successful exploitation of this vulnerability could lead to denial of service, disclosure of sensitive information, or potentially arbitrary code execution when processing specially crafted input (Ubuntu, NetApp).

Mitigation and workarounds

The vulnerability was fixed in zlib with two commits: the initial fix (eff308a) and a follow-up fix (1eb7682) to address crashes. Major operating systems have released patches including Debian (version 1:1.2.11.dfsg-2+deb11u2), Ubuntu, Red Hat, and Fedora. Users should update to patched versions of zlib or affected applications (Debian, Ubuntu).

Community reactions

The vulnerability received significant attention from major vendors who quickly issued patches. Apple included fixes in multiple OS updates including iOS 15.7.1, iOS 16.1, macOS Ventura, and others. NetApp issued advisories and patches for affected products. The curl project identified and reported crashes with the initial fix, leading to the follow-up patch (Apple, NetApp).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management