ID

VAR-202302-0195


CVE

CVE-2022-4450


TITLE

OpenSSL  Double release vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-003616

DESCRIPTION

The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue. OpenSSL has payload data 0 become a part-time worker PEM When creating a file, PEM_read_bio_ex() A double free vulnerability exists because when returns a failure code, it introduces a pointer to an already freed buffer into the header argument.Malicious by attacker PEM Denial of service by providing files ( crash ) It may be in a state. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API. Bugs fixed (https://bugzilla.redhat.com/): 2171965 - [4.11 clone] Secrets are used in env variables 2176012 - [ODF 4.11] Move the defaults for rookceph operator from configmap to csv 2181405 - CVE-2022-40186 vault: Vault Entity Alias Metadata May Leak Between Aliases With The Same Name Assigned To The Same Entity 2183683 - [ODF 4.11] Deployment of ODF 4.9 over external mode failing with: panic: assignment to entry in nil map in ocs-operator logs 2186456 - Include at ODF 4.11 container images the RHEL8 CVE fix on "openssl" 5. Bugs fixed (https://bugzilla.redhat.com/): 2138971 - CVE-2022-3782 keycloak: path traversal via double URL encoding 2155682 - CVE-2022-46364 Apache CXF: SSRF Vulnerability 2162200 - CVE-2022-31690 spring-security-oauth2-client: Privilege Escalation in spring-security-oauth2-client 2170431 - CVE-2022-41966 xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow 5. JIRA issues fixed (https://issues.jboss.org/): MTA-118 - Automated tagging of resources with Windup MTA-123 - MTA crashes cluster nodes when running bulk binary analysis due to requests and limits not being configurable MTA-129 - User field in Manage Import is empty MTA-160 - [Upstream] Maven Repositories "No QueryClient set, use QueryClientProvider to set one" MTA-204 - Every http request made to tagtypes returns HTTP Status 404 MTA-256 - Update application import template MTA-260 - [Regression] Application import through OOTB import template fails MTA-261 - [Regression] UI incorrectly reports target applications have in-progress/complete assessment MTA-263 - [Regression] Discard assessment option present even when assessment is not complete MTA-267 - Analysis EAP targets should include eap8 MTA-268 - RFE: Automated Tagging details to add on Review analysis details page MTA-279 - All types of Source analysis is failing in MTA 6.1.0 MTA-28 - Success Alert is not displayed when subsequent analysis are submitted MTA-282 - Discarding review results in 404 error MTA-283 - Sorting broken on Application inventory page MTA-284 - HTML reports download with no files in reports and stats folders MTA-29 - Asterisk on Description while creating a credentials should be removed MTA-297 - [Custom migration targets] Cannot upload JPG file as an icon MTA-298 - [Custom migration targets] Unclear error when uploading image greater than 1Mb of size MTA-299 - [RFE][Custom migration targets] Assign an icon: Add image max size in the note under the image name MTA-300 - [Custom rules] Cannot upload more than one rules file MTA-303 - [UI][Custom migration targets] The word "Please" should be removed from the error message about existing custom target name MTA-304 - [Custom rules] Failed analysis when retrieving custom rules files from a repository MTA-306 - MTA allows the uploading of multiple binaries for analysis MTA-311 - MTA operator fails to reconcile on a clean (non-upgrade) install MTA-314 - PVCs may not provision if storageClassName is not set. MTA-330 - With auth disabled, 'username' seen in the persona dropdown MTA-332 - Tagging: Few Tags are highlighted with color MTA-34 - Cannot filter by Business Service when copying assessments MTA-345 - [Custom migration targets] Error message "imageID must be defined" is displayed when uploading image MTA-35 - Only the first notification is displayed when discarding multiple copied assessments MTA-350 - Maven Central links from the dependencies tab in reports seem to be broken MTA-351 - AspectJ is not identified as an Open Source Library MTA-356 - The inventory view has to be refreshed for the tags that were assigned by an analysis to appear MTA-363 - [UI][Custom migration targets] "Repository type" field name is missing MTA-364 - [Custom migration targets] Unknown image file when editing a custom migration target MTA-366 - Tagging: For no tags attached "filter by" can be improved MTA-367 - [Custom migration targets] Cannot use a custom migration target in analysis MTA-369 - Custom migration targets: HTML elements are duplicated MTA-375 - Run button does not execute the analysis MTA-377 - [UI][Custom rules] Custom rules screen of the analysis configuration wizard is always marked as required MTA-378 - [UI][Custom rules] Info message on the Custom rules screen is not updated MTA-38 - Only the first notification is displayed when multiple files are imported. MTA-381 - Custom Rules: When try to update Add rules the Error alert is displayed MTA-382 - Custom Rules: Sometimes able to upload duplicate rules files MTA-388 - CSV reports download empty when enabling the option after an analysis MTA-389 - [Custom rules in Analysis] Failed analysis when retrieving custom rules files from a private repository MTA-391 - [Custom rules in Analysis] Targets from uploaded rules file are not removed once the file is removed MTA-392 - Unable to see all custom migration targets when using a vertical monitor MTA-41 - [UI] Failed to refresh token if Keycloak feature "Use Refresh Tokens" is off MTA-412 - Display alert message before reviewing an already reviewed application MTA-428 - [Custom Rules] MTA analysis custom rules conflict message MTA-430 - Analysis wizard: Next button should be enabled only after at least one target is selected MTA-438 - Tagging: Retrieving tags needs a loading indicator MTA-439 - [Regression][Custom rules] Failed to run analysis with custom rules from a repository MTA-443 - Custom rules: Add button can be disabled until duplicate rule file is removed MTA-50 - RFE: Replace the MTA acronym in the title with "Migration Toolkit for Applications" MTA-51 - RFE: " Select the list of packages to be analyzed manually" to modify the title MTA-52 - [RFE] We can change "Not associated artifact" to "No associated artifact" MTA-55 - Can't choose a custom rule via a file explorer(mac OS finder) in Tackle 2.0 MTA-78 - CVE-2022-46364 org.keycloak-keycloak-parent: Apache CXF: SSRF Vulnerability [mta-6.0] MTA-99 - Unable to use root path during checking for maven dependencies 6. Description: Multicluster Engine for Kubernetes 2.1.6 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Jira issue addressed: ACM-3513: MCE 2.1.6 images Security fix(es): * CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability 3. Solution: For multicluster engine for Kubernetes, see the following documentation for details on how to install the images: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/multicluster_engine/multicluster_engine_overview#installing-while-connected-online-mce 4. Bugs fixed (https://bugzilla.redhat.com/): 2174485 - CVE-2023-25173 containerd: Supplementary groups are not set up properly 2178358 - CVE-2022-41723 net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding 2178488 - CVE-2022-41725 golang: net/http, mime/multipart: denial of service from excessive resource consumption 2178492 - CVE-2022-41724 golang: crypto/tls: large handshake records may cause panics 2184481 - CVE-2023-24538 golang: html/template: backticks not treated as string delimiters 2184482 - CVE-2023-24536 golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption 2184483 - CVE-2023-24534 golang: net/http, net/textproto: denial of service from excessive memory allocation 2184484 - CVE-2023-24537 golang: go/parser: Infinite loop in parsing 2185507 - Release of OpenShift Serverless Serving 1.29.0 2185509 - Release of OpenShift Serverless Eventing 1.29.0 5. Description: Security Fix(es) * CVE-2023-29017 vm2: Sandbox Escape * CVE-2023-29199 vm2: Sandbox Escape * CVE-2023-30547 vm2: Sandbox Escape when exception sanitization 3. See https://access.redhat.com/solutions/7007647 for instructions on how to apply this hotfix, as well as for information about when the hotfix has been superseded by a permanent fix and should be removed. Important: This hotfix is a temporary fix that will be supported until 30 days after the date when the next patch release of the product is released. After the 30-day period ends, you must either update to the latest patch release and remove this hotfix to continue receiving security updates and maintain support or upgrade to a newer feature release of the product. Bugs fixed (https://bugzilla.redhat.com/): 2185374 - CVE-2023-29017 vm2: sandbox escape 2187409 - CVE-2023-29199 vm2: Sandbox Escape 2187608 - CVE-2023-30547 vm2: Sandbox Escape when exception sanitization 5. Description: Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 4. JIRA issues fixed (https://issues.redhat.com/): JWS-2933 - Update openssl from JBCS to versions from 2.4.51-SP2 6. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. Summary: The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Description: The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift Container Platform 4.12.22 bug fix and security update Advisory ID: RHSA-2023:3615-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2023:3615 Issue date: 2023-06-22 CVE Names: CVE-2021-4235 CVE-2022-4304 CVE-2022-4450 CVE-2023-0215 CVE-2023-0361 ===================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.12.22 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.22. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHSA-2023:3613 Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes: https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html Security Fix(es): * go-yaml: Denial of Service in go-yaml (CVE-2021-4235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. All OpenShift Container Platform 4.12 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html 3. Solution: For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html You may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags. The sha values for the release are: (For x86_64 architecture) The image digest is sha256:ba7956f5c2aae61c8ff3ab1ab2ee7e625db9b1c8964a65339764db79c148e4e6 (For s390x architecture) The image digest is sha256:36d8c9581c255ea3fb48ee8e3b4acb2e4b408f1c3542b16c55c0637403ef29e7 (For ppc64le architecture) The image digest is sha256:1a3f611d665c1d2b2ddb54d4f54e64c181e59fb57ec97c0578cad42c436a9bbc (For aarch64 architecture) The image digest is sha256:36fe7b5c69297210f8bc0303a58c019fdc4ca578d0c3340b1bc847c47e87d333 All OpenShift Container Platform 4.12 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html. 4. Bugs fixed (https://bugzilla.redhat.com/): 2156727 - CVE-2021-4235 go-yaml: Denial of Service in go-yaml 5. JIRA issues fixed (https://issues.redhat.com/): OCPBUGS-13785 - EgressNetworkPolicy DNS resolution does not fall back to TCP for truncated responses OCPBUGS-14333 - Package openvswitch2.17 conflicts with openvswitch2.15 during the 4.12 to 4.13 upgrade of RHEL worker OCPBUGS-14454 - CRL configmap is limited by 1MB max, not allowing for multiple public CRLS. (4.12) OCPBUGS-14455 - mtls CRL not working when using an intermediate CA (4.12) OCPBUGS-14647 - Errors when running must-gather for 4.12 Rosa/Hypershift cluster OCPBUGS-14671 - It must be possible to append a piece of FRR configuration to what MetalLB renders OCPBUGS-14717 - Maximum Number Of Egress IPs Supported OCPBUGS-14745 - container_network* metrics stop reporting after container restart OCPBUGS-8673 - [whereabouts-cni] [release-4.12] Backport DualStack and the new reconciler to whereabouts plugin 4.12 6. References: https://access.redhat.com/security/cve/CVE-2021-4235 https://access.redhat.com/security/cve/CVE-2022-4304 https://access.redhat.com/security/cve/CVE-2022-4450 https://access.redhat.com/security/cve/CVE-2023-0215 https://access.redhat.com/security/cve/CVE-2023-0361 https://access.redhat.com/security/updates/classification/#moderate https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZJZol9zjgjWX9erEAQisXA/+NLLB9/gV0VO/r2mMIiaD7nzF25RMNy6E W07FAfzzYtrxMYspYtRAKnPv7tLJJT6Aa+xJ0O8jtnv1P0e1BdOr5MrsHiALZgiQ OWj5Px61nnKIRrrBNAEk2nKs2in96otOZryLzWy2osQCl+T17U1/gEQvpYhl18FE UWIHtP3Rzs1+ZdpgcbqvQtPfeKUAp380dGL8V3Gw4rpVYDsiNxvKxdg6cHeyjrb0 fMHK07Pw8PRxUh2xr56a512HkPMhTPIx+xcjZ1RTly9QPXEWjWgDolOiMYRjL/ne UC/A8MumKMiJoltLwTly6si3ChklI36iyrVgH6MHaKjvqPWHH7z2303N632IXvmd KzGVdEtzn/X0zUyutl6c6eJEWidvgaVjLHRynxCeD6Cz5MX2EzD5ITYxyA4MmSgq FcD4NPn6EUs9k2zHSOyfe7extwNlXEslbWYq+rX4aT7FY+Ul7PTwzmAkhzRdOVpr 5Oi4hbwhyqt1DteBr/NNZAHK58BdxP6oi8rgZiZDANwRWk/Dx5xFKMIYD0Z2GHmG +bvA5DqaMLZPv26nHv1rgR9YNzTe/Tw651QePis+4X3YXx6yGuwDW2gs5JMNMnBT xOxT8zctDV1kghhh+IaZMopdQ+hlZCoJyVZv0DbLZoF9mZ74gzLdvCtFyFVvZ8ZG AxaDJxGrtzg= =va8E -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Ubuntu Security Notice USN-5844-1 February 07, 2023 openssl vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in OpenSSL. Software Description: - openssl: Secure Socket Layer (SSL) cryptographic library and tools Details: David Benjamin discovered that OpenSSL incorrectly handled X.400 address processing. A remote attacker could possibly use this issue to read arbitrary memory contents or cause OpenSSL to crash, resulting in a denial of service. (CVE-2023-0286) Corey Bonnell discovered that OpenSSL incorrectly handled X.509 certificate verification. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-4203) Hubert Kario discovered that OpenSSL had a timing based side channel in the OpenSSL RSA Decryption implementation. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2022-4304) Dawei Wang discovered that OpenSSL incorrectly handled parsing certain PEM data. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2022-4450) Octavio Galland and Marcel Böhme discovered that OpenSSL incorrectly handled streaming ASN.1 data. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-0215) Marc Schönefeld discovered that OpenSSL incorrectly handled malformed PKCS7 data. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0216) Kurt Roeckx discovered that OpenSSL incorrectly handled validating certain DSA public keys. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0217) Hubert Kario and Dmitry Belyavsky discovered that OpenSSL incorrectly validated certain signatures. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0401) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.10: libssl3 3.0.5-2ubuntu2.1 Ubuntu 22.04 LTS: libssl3 3.0.2-0ubuntu1.8 Ubuntu 20.04 LTS: libssl1.1 1.1.1f-1ubuntu2.17 Ubuntu 18.04 LTS: libssl1.1 1.1.1-1ubuntu2.1~18.04.21 After a standard system update you need to reboot your computer to make all the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202402-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: OpenSSL: Multiple Vulnerabilities Date: February 04, 2024 Bugs: #876787, #893446, #902779, #903545, #907413, #910556, #911560 ID: 202402-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in OpenSSL, the worst of which could result in denial of service. Affected packages ================= Package Vulnerable Unaffected ---------------- ------------ ------------ dev-libs/openssl < 3.0.10 >= 3.0.10 Description =========== Multiple vulnerabilities have been discovered in OpenSSL. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All OpenSSL users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-3.0.10" References ========== [ 1 ] CVE-2022-3358 https://nvd.nist.gov/vuln/detail/CVE-2022-3358 [ 2 ] CVE-2022-4203 https://nvd.nist.gov/vuln/detail/CVE-2022-4203 [ 3 ] CVE-2022-4304 https://nvd.nist.gov/vuln/detail/CVE-2022-4304 [ 4 ] CVE-2022-4450 https://nvd.nist.gov/vuln/detail/CVE-2022-4450 [ 5 ] CVE-2023-0215 https://nvd.nist.gov/vuln/detail/CVE-2023-0215 [ 6 ] CVE-2023-0216 https://nvd.nist.gov/vuln/detail/CVE-2023-0216 [ 7 ] CVE-2023-0217 https://nvd.nist.gov/vuln/detail/CVE-2023-0217 [ 8 ] CVE-2023-0286 https://nvd.nist.gov/vuln/detail/CVE-2023-0286 [ 9 ] CVE-2023-0401 https://nvd.nist.gov/vuln/detail/CVE-2023-0401 [ 10 ] CVE-2023-0464 https://nvd.nist.gov/vuln/detail/CVE-2023-0464 [ 11 ] CVE-2023-0465 https://nvd.nist.gov/vuln/detail/CVE-2023-0465 [ 12 ] CVE-2023-0466 https://nvd.nist.gov/vuln/detail/CVE-2023-0466 [ 13 ] CVE-2023-2650 https://nvd.nist.gov/vuln/detail/CVE-2023-2650 [ 14 ] CVE-2023-2975 https://nvd.nist.gov/vuln/detail/CVE-2023-2975 [ 15 ] CVE-2023-3446 https://nvd.nist.gov/vuln/detail/CVE-2023-3446 [ 16 ] CVE-2023-3817 https://nvd.nist.gov/vuln/detail/CVE-2023-3817 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202402-08 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. License ======= Copyright 2024 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5

Trust: 2.88

sources: NVD: CVE-2022-4450 // JVNDB: JVNDB-2022-003616 // PACKETSTORM: 173547 // PACKETSTORM: 172045 // PACKETSTORM: 172038 // PACKETSTORM: 172054 // PACKETSTORM: 172084 // PACKETSTORM: 172741 // PACKETSTORM: 171947 // PACKETSTORM: 172460 // PACKETSTORM: 172737 // PACKETSTORM: 172731 // PACKETSTORM: 172973 // PACKETSTORM: 173150 // PACKETSTORM: 170892 // PACKETSTORM: 176985

AFFECTED PRODUCTS

vendor:日立model:ucosminexus application serverscope: - version: -

Trust: 1.6

vendor:日立model:ucosminexus service platformscope: - version: -

Trust: 1.6

vendor:日立model:ucosminexus primary server basescope: - version: -

Trust: 1.6

vendor:stormshieldmodel:network securityscope:gteversion:4.0.0

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:4.3.16

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:4.6.3

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.1.1

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:3.0.0

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:4.4.0

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:3.0.8

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:1.1.1t

Trust: 1.0

vendor:opensslmodel:opensslscope: - version: -

Trust: 0.8

vendor:日本電気model:養殖魚サイズ測定自動化サービスscope: - version: -

Trust: 0.8

vendor:日本電気model:nec ai acceleratorscope: - version: -

Trust: 0.8

vendor:日立model:jp1/data highway - serverscope: - version: -

Trust: 0.8

vendor:日本電気model:spoolserver/reportfilingscope: - version: -

Trust: 0.8

vendor:日立model:hitachi automation directorscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - operations directorscope: - version: -

Trust: 0.8

vendor:日立model:jp1/navigation platformscope: - version: -

Trust: 0.8

vendor:日本電気model:connexive pfscope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus service architectscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center api configuration managerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/operations analyticsscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center common servicesscope: - version: -

Trust: 0.8

vendor:日立model:jp1/performance managementscope: - version: -

Trust: 0.8

vendor:日立model:jp1/snmp system observerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/service support starter editionscope: - version: -

Trust: 0.8

vendor:日本電気model:ix ルータscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage v300scope: - version: -

Trust: 0.8

vendor:日立model:cosminexus http serverscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - smart device managerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/automatic operationscope: - version: -

Trust: 0.8

vendor:日立model:jp1/data highway - server starter editionscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center viewpointscope: - version: -

Trust: 0.8

vendor:日本電気model:得選街・gcbscope: - version: -

Trust: 0.8

vendor:日立model:jp1/automatic job management system 3 - managerscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center automatorscope: - version: -

Trust: 0.8

vendor:日本電気model:neoface monitorscope: - version: -

Trust: 0.8

vendor:日立model:jp1/basescope: - version: -

Trust: 0.8

vendor:日本電気model:istorage v100scope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus developerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/service supportscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage v10escope: - version: -

Trust: 0.8

vendor:日本電気model:esmpro/serveragentscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center analyzer viewpointscope: - version: -

Trust: 0.8

vendor:日立model:jp1/file transmission server/ftpscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center administratorscope: - version: -

Trust: 0.8

vendor:日立model:jp1/navigation platform for developersscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center analyzerscope: - version: -

Trust: 0.8

vendor:日本電気model:nec enhanced speech analysisscope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus application server-rscope: - version: -

Trust: 0.8

vendor:日立model:プログラミング環境 for javascope: - version: -

Trust: 0.8

vendor:日本電気model:vranscope: - version: -

Trust: 0.8

vendor:日立model:hitachi configuration managerscope: - version: -

Trust: 0.8

vendor:日本電気model:nec multimedia olap for 映像分析サービスscope: - version: -

Trust: 0.8

vendor:日本電気model:webotx application serverscope: - version: -

Trust: 0.8

vendor:日本電気model:connexive application platformscope: - version: -

Trust: 0.8

vendor:日立model:jp1/automatic job management system 3 - definitions assistantscope: - version: -

Trust: 0.8

vendor:日本電気model:iot 共通基盤scope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - managerscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-003616 // NVD: CVE-2022-4450

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-4450
value: HIGH

Trust: 1.0

NVD: CVE-2022-4450
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202302-510
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-4450
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2022-4450
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-003616 // CNNVD: CNNVD-202302-510 // NVD: CVE-2022-4450

PROBLEMTYPE DATA

problemtype:CWE-415

Trust: 1.0

problemtype:Double release (CWE-415) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-003616 // NVD: CVE-2022-4450

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 170892 // CNNVD: CNNVD-202302-510

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202302-510

PATCH

title:hitachi-sec-2024-145url:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83

Trust: 0.8

title:OpenSSL Remediation of resource management error vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=225931

Trust: 0.6

title: - url:https://github.com/waugustus/CarpetFuzz

Trust: 0.1

sources: VULMON: CVE-2022-4450 // JVNDB: JVNDB-2022-003616 // CNNVD: CNNVD-202302-510

EXTERNAL IDS

db:NVDid:CVE-2022-4450

Trust: 4.7

db:ICS CERTid:ICSA-23-255-01

Trust: 0.8

db:ICS CERTid:ICSA-24-165-11

Trust: 0.8

db:ICS CERTid:ICSA-23-166-11

Trust: 0.8

db:ICS CERTid:ICSA-23-320-08

Trust: 0.8

db:ICS CERTid:ICSA-23-075-04

Trust: 0.8

db:ICS CERTid:ICSA-24-102-08

Trust: 0.8

db:ICS CERTid:ICSA-24-046-15

Trust: 0.8

db:ICS CERTid:ICSA-23-194-04

Trust: 0.8

db:ICS CERTid:ICSA-24-205-02

Trust: 0.8

db:ICS CERTid:ICSA-24-165-06

Trust: 0.8

db:ICS CERTid:ICSA-24-165-10

Trust: 0.8

db:JVNid:JVNVU92598492

Trust: 0.8

db:JVNid:JVNVU97200253

Trust: 0.8

db:JVNid:JVNVU99836374

Trust: 0.8

db:JVNid:JVNVU99464755

Trust: 0.8

db:JVNid:JVNVU91198149

Trust: 0.8

db:JVNid:JVNVU91213144

Trust: 0.8

db:JVNid:JVNVU99752892

Trust: 0.8

db:JVNid:JVNVU93250330

Trust: 0.8

db:JVNid:JVNVU95292697

Trust: 0.8

db:JVNDBid:JVNDB-2022-003616

Trust: 0.8

db:AUSCERTid:ESB-2023.3456

Trust: 0.6

db:AUSCERTid:ESB-2023.2630

Trust: 0.6

db:AUSCERTid:ESB-2023.1351

Trust: 0.6

db:AUSCERTid:ESB-2023.0732

Trust: 0.6

db:AUSCERTid:ESB-2023.2896

Trust: 0.6

db:AUSCERTid:ESB-2023.2516

Trust: 0.6

db:AUSCERTid:ESB-2023.1074

Trust: 0.6

db:AUSCERTid:ESB-2023.3438

Trust: 0.6

db:AUSCERTid:ESB-2023.4082

Trust: 0.6

db:AUSCERTid:ESB-2023.3597

Trust: 0.6

db:AUSCERTid:ESB-2023.1878

Trust: 0.6

db:AUSCERTid:ESB-2023.3191

Trust: 0.6

db:AUSCERTid:ESB-2023.2262

Trust: 0.6

db:AUSCERTid:ESB-2023.1263

Trust: 0.6

db:AUSCERTid:ESB-2023.2395

Trust: 0.6

db:AUSCERTid:ESB-2023.0703

Trust: 0.6

db:AUSCERTid:ESB-2023.3206

Trust: 0.6

db:AUSCERTid:ESB-2023.3115

Trust: 0.6

db:AUSCERTid:ESB-2023.1430

Trust: 0.6

db:AUSCERTid:ESB-2023.2295

Trust: 0.6

db:AUSCERTid:ESB-2023.3631

Trust: 0.6

db:AUSCERTid:ESB-2023.1327

Trust: 0.6

db:AUSCERTid:ESB-2023.2465

Trust: 0.6

db:PACKETSTORMid:170921

Trust: 0.6

db:CNNVDid:CNNVD-202302-510

Trust: 0.6

db:VULMONid:CVE-2022-4450

Trust: 0.1

db:PACKETSTORMid:173547

Trust: 0.1

db:PACKETSTORMid:172045

Trust: 0.1

db:PACKETSTORMid:172038

Trust: 0.1

db:PACKETSTORMid:172054

Trust: 0.1

db:PACKETSTORMid:172084

Trust: 0.1

db:PACKETSTORMid:172741

Trust: 0.1

db:PACKETSTORMid:171947

Trust: 0.1

db:PACKETSTORMid:172460

Trust: 0.1

db:PACKETSTORMid:172737

Trust: 0.1

db:PACKETSTORMid:172731

Trust: 0.1

db:PACKETSTORMid:172973

Trust: 0.1

db:PACKETSTORMid:173150

Trust: 0.1

db:PACKETSTORMid:170892

Trust: 0.1

db:PACKETSTORMid:176985

Trust: 0.1

sources: VULMON: CVE-2022-4450 // JVNDB: JVNDB-2022-003616 // PACKETSTORM: 173547 // PACKETSTORM: 172045 // PACKETSTORM: 172038 // PACKETSTORM: 172054 // PACKETSTORM: 172084 // PACKETSTORM: 172741 // PACKETSTORM: 171947 // PACKETSTORM: 172460 // PACKETSTORM: 172737 // PACKETSTORM: 172731 // PACKETSTORM: 172973 // PACKETSTORM: 173150 // PACKETSTORM: 170892 // PACKETSTORM: 176985 // CNNVD: CNNVD-202302-510 // NVD: CVE-2022-4450

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2022-4450

Trust: 2.0

url:https://access.redhat.com/security/cve/cve-2022-4450

Trust: 1.8

url:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34cca19c766bbddc31683d0858b

Trust: 1.6

url:https://www.openssl.org/news/secadv/20230207.txt

Trust: 1.6

url:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83

Trust: 1.6

url:https://access.redhat.com/security/cve/cve-2023-0215

Trust: 1.2

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-4304

Trust: 1.2

url:https://bugzilla.redhat.com/):

Trust: 1.2

url:https://access.redhat.com/security/cve/cve-2022-4304

Trust: 1.2

url:https://access.redhat.com/security/team/contact/

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-0215

Trust: 1.1

url:https://security.gentoo.org/glsa/202402-08

Trust: 1.1

url:https://access.redhat.com/security/cve/cve-2023-0286

Trust: 1.0

url:https://access.redhat.com/security/cve/cve-2023-0361

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2023-0286

Trust: 0.9

url:https://jvn.jp/vu/jvnvu91213144/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99752892/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99464755/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu95292697/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu97200253/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu92598492/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91198149/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99836374/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu93250330/index.html

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-04

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-11

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-194-04

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-255-01

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-08

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-046-15

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-102-08

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-06

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-10

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-11

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-205-02

Trust: 0.8

url:https://access.redhat.com/articles/11258

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2023-23916

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2023-0361

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.2395

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.2295

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.2896

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3206

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1263

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.2630

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.0703

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3438

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-4450/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1878

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1074

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.2262

Trust: 0.6

url:https://packetstormsecurity.com/files/170921/openssl-toolkit-3.0.8.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3191

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.4082

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3115

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3456

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1351

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1430

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.2465

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3631

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3597

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.0732

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1327

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.2516

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2023-23916

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-4415

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2023-0767

Trust: 0.4

url:https://issues.redhat.com/):

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-4415

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2023-0767

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-2880

Trust: 0.3

url:https://issues.jboss.org/):

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-41715

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-48303

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-40897

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-10735

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-40897

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-45061

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-10735

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-45061

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-28861

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-28861

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-48303

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-30547

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-25881

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-29199

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-30547

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-29199

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-29017

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-29017

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-25881

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-32190

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-4235

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-27664

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2880

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-32189

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-4235

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-27664

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-24537

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-36227

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41724

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-24538

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-27535

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-24534

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41725

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-36227

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-24536

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-35737

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-47629

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-46848

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41717

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1304

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42898

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1304

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-46848

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-25147

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-25147

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-0401

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-0216

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-4203

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-0217

Trust: 0.2

url:https://github.com/waugustus/carpetfuzz

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-26604

Trust: 0.1

url:https://access.redhat.com/security/vulnerabilities/rhsb-2023-001

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:4114

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-1667

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-2283

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24736

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-24329

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-3089

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-2283

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1667

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24736

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-3089

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-26604

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-24329

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-40186

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:2023

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-40186

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:1887

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/clusters/cluster_mce_overview#installing-while-connected-online-mce

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3782

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30631

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-32148

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32189

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1705

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32190

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32148

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2995

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-31690

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2879

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:2041

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3466

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3172

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3172

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3259

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41966

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3162

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2879

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-46364

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3162

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3259

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-31690

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-30631

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2995

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1705

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/multicluster_engine/multicluster_engine_overview#installing-while-connected-online-mce

Trust: 0.1

url:https://access.redhat.com/security/updates/classification#moderate

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:2061

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-21938

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-21967

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.11/html/serverless/index

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.12/html/serverless/index

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-21939

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.13/html/serverless/index

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-41724

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-21930

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-21939

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-21937

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-21954

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-21938

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-21930

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25173

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3455

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-21968

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-21937

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-41725

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-41723

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41723

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:1893

Trust: 0.1

url:https://access.redhat.com/solutions/7007647

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-22662

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26700

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26719

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:0584

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-26719

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-22629

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-22624

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22628

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22624

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22662

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-26709

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26710

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26716

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-26717

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26709

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-22628

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1586

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-26710

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-40304

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26717

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-34903

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-40303

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-26700

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22629

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-26716

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1586

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3421

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=webserver&downloadtype=securitypatches&version=5.7

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-23915

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25690

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-43552

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-43552

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-43680

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-43680

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-23914

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3355

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-25690

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-23914

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-20001

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-23915

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-43551

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2006-20001

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-43551

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42898

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3970

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-29007

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1999

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25652

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2795

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3624

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2795

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3627

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-35737

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-24540

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-22490

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-2491

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25815

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3627

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-41715

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-23946

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3970

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-41717

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html.

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3615

Trust: 0.1

url:https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3613

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/1.1.1f-1ubuntu2.17

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/1.1.1-1ubuntu2.1~18.04.21

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5844-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/3.0.5-2ubuntu2.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/3.0.2-0ubuntu1.8

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0466

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0464

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3358

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-3817

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-3446

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-2975

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0465

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-2650

Trust: 0.1

sources: VULMON: CVE-2022-4450 // JVNDB: JVNDB-2022-003616 // PACKETSTORM: 173547 // PACKETSTORM: 172045 // PACKETSTORM: 172038 // PACKETSTORM: 172054 // PACKETSTORM: 172084 // PACKETSTORM: 172741 // PACKETSTORM: 171947 // PACKETSTORM: 172460 // PACKETSTORM: 172737 // PACKETSTORM: 172731 // PACKETSTORM: 172973 // PACKETSTORM: 173150 // PACKETSTORM: 170892 // PACKETSTORM: 176985 // CNNVD: CNNVD-202302-510 // NVD: CVE-2022-4450

CREDITS

Red Hat

Trust: 1.2

sources: PACKETSTORM: 173547 // PACKETSTORM: 172045 // PACKETSTORM: 172038 // PACKETSTORM: 172054 // PACKETSTORM: 172084 // PACKETSTORM: 172741 // PACKETSTORM: 171947 // PACKETSTORM: 172460 // PACKETSTORM: 172737 // PACKETSTORM: 172731 // PACKETSTORM: 172973 // PACKETSTORM: 173150

SOURCES

db:VULMONid:CVE-2022-4450
db:JVNDBid:JVNDB-2022-003616
db:PACKETSTORMid:173547
db:PACKETSTORMid:172045
db:PACKETSTORMid:172038
db:PACKETSTORMid:172054
db:PACKETSTORMid:172084
db:PACKETSTORMid:172741
db:PACKETSTORMid:171947
db:PACKETSTORMid:172460
db:PACKETSTORMid:172737
db:PACKETSTORMid:172731
db:PACKETSTORMid:172973
db:PACKETSTORMid:173150
db:PACKETSTORMid:170892
db:PACKETSTORMid:176985
db:CNNVDid:CNNVD-202302-510
db:NVDid:CVE-2022-4450

LAST UPDATE DATE

2024-11-23T21:06:22.835000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2022-003616date:2024-11-01T05:45:00
db:CNNVDid:CNNVD-202302-510date:2023-07-20T00:00:00
db:NVDid:CVE-2022-4450date:2024-02-04T09:15:08.733

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2022-003616date:2023-02-28T00:00:00
db:PACKETSTORMid:173547date:2023-07-18T13:35:08
db:PACKETSTORMid:172045date:2023-04-26T15:28:12
db:PACKETSTORMid:172038date:2023-04-26T15:20:08
db:PACKETSTORMid:172054date:2023-04-27T18:56:06
db:PACKETSTORMid:172084date:2023-05-02T15:33:51
db:PACKETSTORMid:172741date:2023-06-06T16:34:53
db:PACKETSTORMid:171947date:2023-04-20T15:55:06
db:PACKETSTORMid:172460date:2023-05-19T14:41:19
db:PACKETSTORMid:172737date:2023-06-06T16:32:27
db:PACKETSTORMid:172731date:2023-06-06T16:29:30
db:PACKETSTORMid:172973date:2023-06-16T16:21:58
db:PACKETSTORMid:173150date:2023-06-27T15:21:05
db:PACKETSTORMid:170892date:2023-02-08T15:56:54
db:PACKETSTORMid:176985date:2024-02-05T15:20:51
db:CNNVDid:CNNVD-202302-510date:2023-02-07T00:00:00
db:NVDid:CVE-2022-4450date:2023-02-08T20:15:23.973