ID

VAR-202302-0195


CVE

CVE-2022-4450


TITLE

OpenSSL  Double release vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-003616

DESCRIPTION

The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue. OpenSSL has payload data 0 become a part-time worker PEM When creating a file, PEM_read_bio_ex() A double free vulnerability exists because when returns a failure code, it introduces a pointer to an already freed buffer into the header argument.Malicious by attacker PEM Denial of service by providing files ( crash ) It may be in a state. ========================================================================== Ubuntu Security Notice USN-5844-1 February 07, 2023 openssl vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in OpenSSL. Software Description: - openssl: Secure Socket Layer (SSL) cryptographic library and tools Details: David Benjamin discovered that OpenSSL incorrectly handled X.400 address processing. A remote attacker could possibly use this issue to read arbitrary memory contents or cause OpenSSL to crash, resulting in a denial of service. (CVE-2023-0286) Corey Bonnell discovered that OpenSSL incorrectly handled X.509 certificate verification. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2022-4203) Hubert Kario discovered that OpenSSL had a timing based side channel in the OpenSSL RSA Decryption implementation. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2022-4304) Dawei Wang discovered that OpenSSL incorrectly handled parsing certain PEM data. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. (CVE-2022-4450) Octavio Galland and Marcel Böhme discovered that OpenSSL incorrectly handled streaming ASN.1 data. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-0215) Marc Schönefeld discovered that OpenSSL incorrectly handled malformed PKCS7 data. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0216) Kurt Roeckx discovered that OpenSSL incorrectly handled validating certain DSA public keys. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0217) Hubert Kario and Dmitry Belyavsky discovered that OpenSSL incorrectly validated certain signatures. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10. (CVE-2023-0401) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.10: libssl3 3.0.5-2ubuntu2.1 Ubuntu 22.04 LTS: libssl3 3.0.2-0ubuntu1.8 Ubuntu 20.04 LTS: libssl1.1 1.1.1f-1ubuntu2.17 Ubuntu 18.04 LTS: libssl1.1 1.1.1-1ubuntu2.1~18.04.21 After a standard system update you need to reboot your computer to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-5844-1 CVE-2022-4203, CVE-2022-4304, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0286, CVE-2023-0401 Package Information: https://launchpad.net/ubuntu/+source/openssl/3.0.5-2ubuntu2.1 https://launchpad.net/ubuntu/+source/openssl/3.0.2-0ubuntu1.8 https://launchpad.net/ubuntu/+source/openssl/1.1.1f-1ubuntu2.17 https://launchpad.net/ubuntu/+source/openssl/1.1.1-1ubuntu2.1~18.04.21 . This advisory contains OpenShift Virtualization 4.11.6 images. Bug Fix(es): * Requested TSC frequency outside tolerance range & TSC scaling not supported (BZ#2151169) * User cannot get resource "virtualmachineinstances/portforward" in API group "subresources.kubevirt.io" (BZ#2160673) * 4.11.4 containers (BZ#2173835) * VMI with x86_Icelake fail when mpx feature is missing (BZ#2218193) 3. Bugs fixed (https://bugzilla.redhat.com/): 2151169 - Requested TSC frequency outside tolerance range & TSC scaling not supported 2160673 - User cannot get resource "virtualmachineinstances/portforward" in API group "subresources.kubevirt.io" 2173835 - 4.11.4 containers 2212085 - CVE-2023-3089 openshift: OCP & FIPS mode 2218193 - VMI with x86_Icelake fail when mpx feature is missing 5. Bugs fixed (https://bugzilla.redhat.com/): 2161274 - CVE-2022-41717 golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests 5. Description: Security Fix(es) * CVE-2023-29017 vm2: Sandbox Escape * CVE-2023-29199 vm2: Sandbox Escape * CVE-2023-30547 vm2: Sandbox Escape when exception sanitization 3. See https://access.redhat.com/solutions/7007647 for instructions on how to apply this hotfix, as well as for information about when the hotfix has been superseded by a permanent fix and should be removed. Important: This hotfix is a temporary fix that will be supported until 30 days after the date when the next patch release of the product is released. After the 30-day period ends, you must either update to the latest patch release and remove this hotfix to continue receiving security updates and maintain support or upgrade to a newer feature release of the product. Bugs fixed (https://bugzilla.redhat.com/): 2185374 - CVE-2023-29017 vm2: sandbox escape 2187409 - CVE-2023-29199 vm2: Sandbox Escape 2187608 - CVE-2023-30547 vm2: Sandbox Escape when exception sanitization 5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: openssl security update Advisory ID: RHSA-2023:1405-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:1405 Issue date: 2023-03-22 CVE Names: CVE-2022-4304 CVE-2022-4450 CVE-2023-0215 CVE-2023-0286 ===================================================================== 1. Summary: An update for openssl is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64 3. Security Fix(es): * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) * openssl: timing attack in RSA Decryption implementation (CVE-2022-4304) * openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450) * openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 5. Package List: Red Hat Enterprise Linux BaseOS (v. 8): Source: openssl-1.1.1k-9.el8_7.src.rpm aarch64: openssl-1.1.1k-9.el8_7.aarch64.rpm openssl-debuginfo-1.1.1k-9.el8_7.aarch64.rpm openssl-debugsource-1.1.1k-9.el8_7.aarch64.rpm openssl-devel-1.1.1k-9.el8_7.aarch64.rpm openssl-libs-1.1.1k-9.el8_7.aarch64.rpm openssl-libs-debuginfo-1.1.1k-9.el8_7.aarch64.rpm openssl-perl-1.1.1k-9.el8_7.aarch64.rpm ppc64le: openssl-1.1.1k-9.el8_7.ppc64le.rpm openssl-debuginfo-1.1.1k-9.el8_7.ppc64le.rpm openssl-debugsource-1.1.1k-9.el8_7.ppc64le.rpm openssl-devel-1.1.1k-9.el8_7.ppc64le.rpm openssl-libs-1.1.1k-9.el8_7.ppc64le.rpm openssl-libs-debuginfo-1.1.1k-9.el8_7.ppc64le.rpm openssl-perl-1.1.1k-9.el8_7.ppc64le.rpm s390x: openssl-1.1.1k-9.el8_7.s390x.rpm openssl-debuginfo-1.1.1k-9.el8_7.s390x.rpm openssl-debugsource-1.1.1k-9.el8_7.s390x.rpm openssl-devel-1.1.1k-9.el8_7.s390x.rpm openssl-libs-1.1.1k-9.el8_7.s390x.rpm openssl-libs-debuginfo-1.1.1k-9.el8_7.s390x.rpm openssl-perl-1.1.1k-9.el8_7.s390x.rpm x86_64: openssl-1.1.1k-9.el8_7.x86_64.rpm openssl-debuginfo-1.1.1k-9.el8_7.i686.rpm openssl-debuginfo-1.1.1k-9.el8_7.x86_64.rpm openssl-debugsource-1.1.1k-9.el8_7.i686.rpm openssl-debugsource-1.1.1k-9.el8_7.x86_64.rpm openssl-devel-1.1.1k-9.el8_7.i686.rpm openssl-devel-1.1.1k-9.el8_7.x86_64.rpm openssl-libs-1.1.1k-9.el8_7.i686.rpm openssl-libs-1.1.1k-9.el8_7.x86_64.rpm openssl-libs-debuginfo-1.1.1k-9.el8_7.i686.rpm openssl-libs-debuginfo-1.1.1k-9.el8_7.x86_64.rpm openssl-perl-1.1.1k-9.el8_7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZBxe+dzjgjWX9erEAQh31xAAjBvbabbNmffgkC9ZxiOaOr2NJ1g4tgd8 FDNwQp6+K8Qp7JlFw4GNKN9UbDkOKxfzAdjwyeYiO+d17g8O0aFWWfUSlfKjgZPF OCyBTbpuJFrAQiOjID2SyAnWRku6KoQvSvzh7elJT+25qsTNLbk+3a3EBghSsN3p GognFsBAkX9R+2gRoaDKhKOCrqAs1vb19SYbM7SCxd9GjhLKCeKzpElgYEKUhoLt GBfJRA/C5Pnbn1DLvQY2CCxfAVIReXCRGHBM/3RsCKHTfACYDDbjUTlPSWpZzfsL g2b8PPPsEG5Yg2TPR4yOjbKT1TeSPMCQnRX19eu9az+CuvOv8QOfTYIIqxJ2niKT WqJVHTe3mc2+s6rUfGv0TIk1FxXj8sOanLVXyzyzIIBd8Z40DbPa4Lckg3IJM92A GPIGvm+4MlZm74SFAZmcI5XqJ3tNu4IaVt8vJFEVMioJl797/q6sZArgVMa9WIvT 2Cc5N6P3eR2wggBy0ImZTGP2szCYxzfVHJCP/5ArvOSJLTHGVVU5vdoFEzTye2i/ Ff7g/jeLjKVX0Pke26J2Vt2vQ/dgSatIZ0JwYjS/1lTiRWtg034pm7kyZrIKEkX9 YLalEbV/bGaB8mCkY+JkvPypMqEapbyLUw5/UbFYDKZErJh+YbfqEEDM0xAkyiKo DxAoeBXV9B4= =qsre -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description: Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. JIRA issues fixed (https://issues.redhat.com/): JWS-2933 - Update openssl from JBCS to versions from 2.4.51-SP2 6. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. Summary: The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Description: The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Bugs fixed (https://bugzilla.redhat.com/): 2184481 - CVE-2023-24538 golang: html/template: backticks not treated as string delimiters 2184482 - CVE-2023-24536 golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption 2184483 - CVE-2023-24534 golang: net/http, net/textproto: denial of service from excessive memory allocation 2184484 - CVE-2023-24537 golang: go/parser: Infinite loop in parsing 2196027 - CVE-2023-24540 golang: html/template: improper handling of JavaScript whitespace 2204461 - Adjust rsync options in DVM 2210565 - Direct migration completes with warnings, failing on DVM phase 2212528 - Rsync pod fails due to error in starting client-server protocol (code 5) 5

Trust: 2.34

sources: NVD: CVE-2022-4450 // JVNDB: JVNDB-2022-003616 // PACKETSTORM: 170892 // PACKETSTORM: 174629 // PACKETSTORM: 171596 // PACKETSTORM: 171947 // PACKETSTORM: 171431 // PACKETSTORM: 172737 // PACKETSTORM: 172731 // PACKETSTORM: 172973

AFFECTED PRODUCTS

vendor:日立model:ucosminexus primary server basescope: - version: -

Trust: 1.6

vendor:日立model:ucosminexus application serverscope: - version: -

Trust: 1.6

vendor:日立model:ucosminexus service platformscope: - version: -

Trust: 1.6

vendor:stormshieldmodel:network securityscope:gteversion:4.0.0

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:4.3.16

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:4.6.3

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.1.1

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:3.0.0

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:4.4.0

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:3.0.8

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:1.1.1t

Trust: 1.0

vendor:日本電気model:istorage t280scope: - version: -

Trust: 0.8

vendor:日本電気model:iot 共通基盤scope: - version: -

Trust: 0.8

vendor:日立model:jp1/performance managementscope: - version: -

Trust: 0.8

vendor:日立model:jp1/automatic job management system 3 - managerscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage v100scope: - version: -

Trust: 0.8

vendor:日立model:cosminexus http serverscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center administratorscope: - version: -

Trust: 0.8

vendor:日立model:jp1/navigation platformscope: - version: -

Trust: 0.8

vendor:日立model:jp1/data highway - server starter editionscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - managerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/navigation platform for developersscope: - version: -

Trust: 0.8

vendor:日本電気model:養殖魚サイズ測定自動化サービスscope: - version: -

Trust: 0.8

vendor:日本電気model:得選街・gcbscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center automatorscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage v10escope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus service architectscope: - version: -

Trust: 0.8

vendor:日本電気model:nec ai acceleratorscope: - version: -

Trust: 0.8

vendor:opensslmodel:opensslscope: - version: -

Trust: 0.8

vendor:日立model:jp1/automatic job management system 3 - definitions assistantscope: - version: -

Trust: 0.8

vendor:日本電気model:nec multimedia olap for 映像分析サービスscope: - version: -

Trust: 0.8

vendor:日本電気model:esmpro/serveragentscope: - version: -

Trust: 0.8

vendor:日本電気model:neoface monitorscope: - version: -

Trust: 0.8

vendor:日立model:jp1/automatic operationscope: - version: -

Trust: 0.8

vendor:日立model:プログラミング環境 for javascope: - version: -

Trust: 0.8

vendor:日立model:jp1/operations analyticsscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center api configuration managerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/service support starter editionscope: - version: -

Trust: 0.8

vendor:日本電気model:vranscope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus application server-rscope: - version: -

Trust: 0.8

vendor:日立model:jp1/basescope: - version: -

Trust: 0.8

vendor:日本電気model:nec enhanced speech analysisscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center analyzer viewpointscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center common servicesscope: - version: -

Trust: 0.8

vendor:日立model:hitachi configuration managerscope: - version: -

Trust: 0.8

vendor:日立model:hitachi automation directorscope: - version: -

Trust: 0.8

vendor:日本電気model:spoolserver/reportfilingscope: - version: -

Trust: 0.8

vendor:日立model:jp1/service supportscope: - version: -

Trust: 0.8

vendor:日本電気model:ix ルータscope: - version: -

Trust: 0.8

vendor:日本電気model:connexive application platformscope: - version: -

Trust: 0.8

vendor:日本電気model:webotx application serverscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - operations directorscope: - version: -

Trust: 0.8

vendor:日本電気model:connexive pfscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage v300scope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center analyzerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/file transmission server/ftpscope: - version: -

Trust: 0.8

vendor:日立model:jp1/snmp system observerscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center viewpointscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - smart device managerscope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus developerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/data highway - serverscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-003616 // NVD: CVE-2022-4450

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-4450
value: HIGH

Trust: 1.0

NVD: CVE-2022-4450
value: HIGH

Trust: 0.8

nvd@nist.gov: CVE-2022-4450
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2022-4450
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-003616 // NVD: CVE-2022-4450

PROBLEMTYPE DATA

problemtype:CWE-415

Trust: 1.0

problemtype:Double release (CWE-415) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-003616 // NVD: CVE-2022-4450

THREAT TYPE

remote

Trust: 0.1

sources: PACKETSTORM: 170892

TYPE

arbitrary

Trust: 0.1

sources: PACKETSTORM: 170892

PATCH

title:hitachi-sec-2024-145url:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83

Trust: 0.8

title: - url:https://github.com/waugustus/CarpetFuzz

Trust: 0.1

sources: VULMON: CVE-2022-4450 // JVNDB: JVNDB-2022-003616

EXTERNAL IDS

db:NVDid:CVE-2022-4450

Trust: 3.5

db:JVNid:JVNVU91198149

Trust: 0.8

db:JVNid:JVNVU99464755

Trust: 0.8

db:JVNid:JVNVU95292697

Trust: 0.8

db:JVNid:JVNVU91213144

Trust: 0.8

db:JVNid:JVNVU99752892

Trust: 0.8

db:JVNid:JVNVU92598492

Trust: 0.8

db:JVNid:JVNVU93250330

Trust: 0.8

db:JVNid:JVNVU97200253

Trust: 0.8

db:JVNid:JVNVU99836374

Trust: 0.8

db:ICS CERTid:ICSA-23-320-08

Trust: 0.8

db:ICS CERTid:ICSA-24-102-08

Trust: 0.8

db:ICS CERTid:ICSA-24-165-10

Trust: 0.8

db:ICS CERTid:ICSA-23-255-01

Trust: 0.8

db:ICS CERTid:ICSA-24-046-15

Trust: 0.8

db:ICS CERTid:ICSA-23-075-04

Trust: 0.8

db:ICS CERTid:ICSA-24-165-06

Trust: 0.8

db:ICS CERTid:ICSA-23-166-11

Trust: 0.8

db:ICS CERTid:ICSA-24-165-11

Trust: 0.8

db:ICS CERTid:ICSA-23-194-04

Trust: 0.8

db:ICS CERTid:ICSA-24-205-02

Trust: 0.8

db:JVNDBid:JVNDB-2022-003616

Trust: 0.8

db:VULMONid:CVE-2022-4450

Trust: 0.1

db:PACKETSTORMid:170892

Trust: 0.1

db:PACKETSTORMid:174629

Trust: 0.1

db:PACKETSTORMid:171596

Trust: 0.1

db:PACKETSTORMid:171947

Trust: 0.1

db:PACKETSTORMid:171431

Trust: 0.1

db:PACKETSTORMid:172737

Trust: 0.1

db:PACKETSTORMid:172731

Trust: 0.1

db:PACKETSTORMid:172973

Trust: 0.1

sources: VULMON: CVE-2022-4450 // JVNDB: JVNDB-2022-003616 // PACKETSTORM: 170892 // PACKETSTORM: 174629 // PACKETSTORM: 171596 // PACKETSTORM: 171947 // PACKETSTORM: 171431 // PACKETSTORM: 172737 // PACKETSTORM: 172731 // PACKETSTORM: 172973 // NVD: CVE-2022-4450

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2022-4450

Trust: 1.6

url:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83

Trust: 1.0

url:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34cca19c766bbddc31683d0858b

Trust: 1.0

url:https://security.gentoo.org/glsa/202402-08

Trust: 1.0

url:https://www.openssl.org/news/secadv/20230207.txt

Trust: 1.0

url:https://jvn.jp/vu/jvnvu91213144/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99752892/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99464755/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu95292697/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu97200253/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu92598492/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91198149/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99836374/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu93250330/index.html

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-04

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-11

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-194-04

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-255-01

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-08

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-046-15

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-102-08

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-06

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-10

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-11

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-205-02

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-4304

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-0215

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2023-0286

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2022-4450

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2022-4304

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2023-0215

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2023-0286

Trust: 0.7

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.7

url:https://access.redhat.com/security/team/contact/

Trust: 0.7

url:https://bugzilla.redhat.com/):

Trust: 0.7

url:https://access.redhat.com/articles/11258

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2023-23916

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2023-23916

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2023-0361

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-41717

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41717

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-25147

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-25147

Trust: 0.2

url:https://github.com/waugustus/carpetfuzz

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0401

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/1.1.1f-1ubuntu2.17

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0216

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/1.1.1-1ubuntu2.1~18.04.21

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5844-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/3.0.5-2ubuntu2.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/3.0.2-0ubuntu1.8

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-4203

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0217

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-3709

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-38408

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0361

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-3899

Trust: 0.1

url:https://access.redhat.com/security/vulnerabilities/rhsb-2023-001

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-38408

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-2828

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:5103

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-3089

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-3089

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-2828

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-3709

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-3899

Trust: 0.1

url:https://issues.jboss.org/):

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:1310

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0767

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-0767

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:1893

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-29199

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-4415

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-29017

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-29017

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-4415

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30547

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-30547

Trust: 0.1

url:https://access.redhat.com/solutions/7007647

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-29199

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:1405

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3421

Trust: 0.1

url:https://issues.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=webserver&downloadtype=securitypatches&version=5.7

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-23915

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25690

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-43552

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-43552

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-43680

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-43680

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-23914

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3355

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-25690

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-23914

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-20001

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-23915

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-43551

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2006-20001

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-43551

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42898

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-36227

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-27535

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42898

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3970

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-29007

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1999

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-24538

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25652

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2795

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-35737

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-46848

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3624

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2795

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-36227

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41715

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-47629

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3627

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-35737

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-24540

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-24534

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2880

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-46848

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-22490

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1304

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-2491

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25815

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3627

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2880

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-41715

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-23946

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-24536

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3970

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-24537

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1304

Trust: 0.1

sources: VULMON: CVE-2022-4450 // JVNDB: JVNDB-2022-003616 // PACKETSTORM: 170892 // PACKETSTORM: 174629 // PACKETSTORM: 171596 // PACKETSTORM: 171947 // PACKETSTORM: 171431 // PACKETSTORM: 172737 // PACKETSTORM: 172731 // PACKETSTORM: 172973 // NVD: CVE-2022-4450

CREDITS

Red Hat

Trust: 0.7

sources: PACKETSTORM: 174629 // PACKETSTORM: 171596 // PACKETSTORM: 171947 // PACKETSTORM: 171431 // PACKETSTORM: 172737 // PACKETSTORM: 172731 // PACKETSTORM: 172973

SOURCES

db:VULMONid:CVE-2022-4450
db:JVNDBid:JVNDB-2022-003616
db:PACKETSTORMid:170892
db:PACKETSTORMid:174629
db:PACKETSTORMid:171596
db:PACKETSTORMid:171947
db:PACKETSTORMid:171431
db:PACKETSTORMid:172737
db:PACKETSTORMid:172731
db:PACKETSTORMid:172973
db:NVDid:CVE-2022-4450

LAST UPDATE DATE

2025-02-09T22:25:48.085000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2022-003616date:2024-12-02T05:11:00
db:NVDid:CVE-2022-4450date:2024-02-04T09:15:08.733

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2022-003616date:2023-02-28T00:00:00
db:PACKETSTORMid:170892date:2023-02-08T15:56:54
db:PACKETSTORMid:174629date:2023-09-12T16:19:34
db:PACKETSTORMid:171596date:2023-03-30T17:30:33
db:PACKETSTORMid:171947date:2023-04-20T15:55:06
db:PACKETSTORMid:171431date:2023-03-24T16:13:38
db:PACKETSTORMid:172737date:2023-06-06T16:32:27
db:PACKETSTORMid:172731date:2023-06-06T16:29:30
db:PACKETSTORMid:172973date:2023-06-16T16:21:58
db:NVDid:CVE-2022-4450date:2023-02-08T20:15:23.973