ID

VAR-202203-0005


CVE

CVE-2022-0778


TITLE

OpenSSL  of  BN_mod_sqrt()  Problem that causes an infinite loop when the law in

Trust: 0.8

sources: JVNDB: JVNDB-2022-001476

DESCRIPTION

The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc). OpenSSL Project Than, OpenSSL Security Advisory [15 March 2022] Has been published. Severity − High ( Severity: High ) OpenSSL of BN_mod_sqrt() Computes the square root in a finite field. BN_mod_sqrt() Has the problem of causing an infinite loop if the law is non-prime. Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2372) Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2389) Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). (CVE-2021-35604) get_sort_by_table in MariaDB prior to 10.6.2 allows an application crash via certain subquery uses of ORDER BY. (CVE-2021-46657) save_window_function_values in MariaDB prior to 10.6.3 allows an application crash because of incorrect handling of with_window_func=true for a subquery. (CVE-2021-46658) MariaDB prior to 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW. (CVE-2021-46659) MariaDB up to and including 10.5.9 allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE). (CVE-2021-46661) MariaDB up to and including 10.5.9 allows a set_var.cc application crash via certain uses of an UPDATE statement in conjunction with a nested subquery. (CVE-2021-46662) MariaDB up to and including 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements. (CVE-2021-46663) MariaDB up to and including 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr. (CVE-2021-46664) MariaDB up to and including 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations. (CVE-2021-46665) MariaDB prior to 10.6.2 allows an application crash because of mishandling of a pushdown from a HAVING clause to a WHERE clause. (CVE-2021-46666) An integer overflow vulnerability was found in MariaDB, where an invalid size of ref_pointer_array is allocated. This issue results in a denial of service. (CVE-2021-46667) MariaDB up to and including 10.5.9 allows an application crash via certain long SELECT DISTINCT statements that improperly interact with storage-engine resource limitations for temporary data structures. (CVE-2021-46668) A use-after-free vulnerability was found in MariaDB. This flaw allows malicious users to trigger a convert_const_to_int() use-after-free when the BIGINT data type is used, resulting in a denial of service. (CVE-2022-0778) (CVE-2022-0778) Vulnerability in the MySQL Server product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21595) MariaDB CONNECT Storage Engine Stack-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local malicious users to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191. (CVE-2022-24048) MariaDB CONNECT Storage Engine Use-After-Free Privilege Escalation Vulnerability. This vulnerability allows local malicious users to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16207. (CVE-2022-24050) MariaDB CONNECT Storage Engine Format String Privilege Escalation Vulnerability. This vulnerability allows local malicious users to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16193. (CVE-2022-24051) A flaw was found in MariaDB. Lack of input validation leads to a heap buffer overflow. This flaw allows an authenticated, local attacker with at least a low level of privileges to submit a crafted SQL query to MariaDB and escalate their privileges to the level of the MariaDB service user, running arbitrary code. (CVE-2022-24052) MariaDB Server v10.6.5 and below exists to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements. (CVE-2022-27376) MariaDB Server v10.6.3 and below exists to contain an use-after-free in the component Item_func_in::cleanup(), which is exploited via specially crafted SQL statements. (CVE-2022-27377) An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below exists to allow malicious users to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27378) An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below exists to allow malicious users to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27379) An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below exists to allow malicious users to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27380) An issue in the component Field::set_default of MariaDB Server v10.6 and below exists to allow malicious users to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27381) MariaDB Server v10.7 and below exists to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order. (CVE-2022-27382) MariaDB Server v10.6 and below exists to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements. (CVE-2022-27383) An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below exists to allow malicious users to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27384) An issue in the component Used_tables_and_const_cache::used_tables_and_const_cache_join of MariaDB Server v10.7 and below exists to allow malicious users to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27385) MariaDB Server v10.7 and below exists to contain a segmentation fault via the component sql/sql_class.cc. (CVE-2022-27386) MariaDB Server v10.7 and below exists to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements. (CVE-2022-27387) MariaDB Server v10.9 and below exists to contain a segmentation fault via the component sql/item_subselect.cc. (CVE-2022-27444) MariaDB Server v10.9 and below exists to contain a segmentation fault via the component sql/sql_window.cc. (CVE-2022-27445) MariaDB Server v10.9 and below exists to contain a segmentation fault via the component sql/item_cmpfunc.h. (CVE-2022-27446) MariaDB Server v10.9 and below exists to contain a use-after-free via the component Binary_string::free_buffer() at /sql/sql_string.h. (CVE-2022-27447) There is an Assertion failure in MariaDB Server v10.9 and below via 'node-&gt;pcur-&gt;rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc. (CVE-2022-27448) MariaDB Server v10.9 and below exists to contain a segmentation fault via the component sql/item_func.cc:148. (CVE-2022-27449) MariaDB Server v10.9 and below exists to contain a segmentation fault via the component sql/field_conv.cc. (CVE-2022-27451) MariaDB Server v10.9 and below exists to contain a segmentation fault via the component sql/item_cmpfunc.cc. (CVE-2022-27452) MariaDB Server v10.6.3 and below exists to contain an use-after-free in the component my_wildcmp_8bit_impl at /strings/ctype-simple.c. (CVE-2022-27455) MariaDB Server v10.6.3 and below exists to contain an use-after-free in the component VDec::VDec at /sql/sql_type.cc. (CVE-2022-27456) MariaDB Server v10.6.3 and below exists to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c. (CVE-2022-27457) MariaDB Server v10.6.3 and below exists to contain an use-after-free in the component Binary_string::free_buffer() at /sql/sql_string.h. (CVE-2022-27458) MariaDB Server prior to 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. (CVE-2022-31622) MariaDB Server prior to 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd-&gt;ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock. (CVE-2022-31623) MariaDB Server prior to 10.7 is vulnerable to Denial of Service. While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service due to the deadlock. (CVE-2022-31624) MariaDB v10.4 to v10.7 exists to contain an use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc. (CVE-2022-32081) MariaDB v10.5 to v10.7 exists to contain an assertion failure at table-&gt;get_ref_count() == 0 in dict0dict.cc. (CVE-2022-32082) MariaDB v10.2 to v10.6.1 exists to contain a segmentation fault via the component Item_subselect::init_expr_cache_tracker. (CVE-2022-32083) MariaDB v10.2 to v10.7 exists to contain a segmentation fault via the component sub_select. (CVE-2022-32084) MariaDB v10.2 to v10.7 exists to contain a segmentation fault via the component Item_func_in::cleanup/Item::cleanup_processor. (CVE-2022-32085) MariaDB v10.4 to v10.8 exists to contain a segmentation fault via the component Item_field::fix_outer_field. (CVE-2022-32086) MariaDB v10.2 to v10.7 exists to contain a segmentation fault via the component Item_args::walk_args. (CVE-2022-32087) MariaDB v10.2 to v10.7 exists to contain a segmentation fault via the component Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort. (CVE-2022-32088) MariaDB v10.5 to v10.7 exists to contain a segmentation fault via the component st_select_lex_unit::exclude_level. (CVE-2022-32089) MariaDB v10.7 exists to contain an use-after-poison in in __interceptor_memset at /libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc. (CVE-2022-32091) In MariaDB prior to 10.9.2, compress_write in extra/mariabackup/ds_compress.cc does not release data_mutex upon a stream write failure, which allows local users to trigger a deadlock. (CVE-2022-38791). Description: Service Telemetry Framework (STF) provides automated collection of measurements and data from remote clients, such as Red Hat OpenStack Platform or third-party nodes. Dockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally. Bugs fixed (https://bugzilla.redhat.com/): 2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read 5. 8) - aarch64, ppc64le, s390x, x86_64 3. compat-openssl10 provides the legacy 1.0 version of OpenSSL for use with older binaries. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.29. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHBA-2022:1362 Space precludes documenting all of the container images in this advisory. You may download the oc tool and use it to inspect release image metadata as follows: (For x86_64 architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.29 - -x86_64 The image digest is sha256:b04ca01d116f0134a102a57f86c67e5b1a3b5da1c4a580af91d521b8fa0aa6ec (For s390x architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.29 - -s390x The image digest is sha256:298c46d172baff871d8f03a2075d178d5a3dafea8aaf47c8e915faaee8e80df1 (For ppc64le architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.29-ppc64le The image digest is sha256:111e8c36289168ed84b1caa065bf568cb55213741371ee145e1e03afe63c9740 All OpenShift Container Platform 4.9 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html 3. Solution: For OpenShift Container Platform 4.9 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2021595 - Key value field is not getting updated under Environment Tab in OpenShift Web Console 2036609 - ovnkube-node pod enters CrashLoopBackOff after OVN_IMAGE is swapped 2059700 - [OVN]After reboot egress node, lr-policy-list was not correct, some duplicate records or missed internal IPs 2062310 - MCC bootstrap command lacks template flag 2063327 - MCO template output directories created with wrong mode causing render failure in unprivileged container environments 2064408 - operator-sdk 1.10-ocp: scorecard impacted by docker rate limit; switch to using ubi instead of busybox 2066837 - CVE-2022-24769 moby: Default inheritable capabilities for linux container should be empty 2069498 - Pre compute Jenkins Plugins list 2070277 - cluster-autoscaler-default will fail when automated etcd defrag is running on large scale OpenShift Container Platform 4 - Cluster 2070617 - [4.9] local pv's are in terminating state 2071692 - Add-flow e2e tests not available for older versions than 4.10 2072995 - csv_succeeded metric not present in olm-operator for all successful CSVs 2073967 - Installation of Openshift virtualization fails with error service "hco-webhook-service" not found 5. Description: This release adds the new Apache HTTP Server 2.4.37 Service Pack 11 packages that are part of the JBoss Core Services offering. This release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/): 1950515 - CVE-2021-3541 libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms 1954225 - CVE-2021-3516 libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c 1954232 - CVE-2021-3517 libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c 1954242 - CVE-2021-3518 libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c 1956522 - CVE-2021-3537 libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode 2056913 - CVE-2022-23308 libxml2: Use-after-free of ID and IDREF attributes 2062202 - CVE-2022-0778 openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates 2064321 - CVE-2022-22720 httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling 6. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202405-29 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Low Title: Node.js: Multiple Vulnerabilities Date: May 08, 2024 Bugs: #772422, #781704, #800986, #805053, #807775, #811273, #817938, #831037, #835615, #857111, #865627, #872692, #879617, #918086, #918614 ID: 202405-29 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been discovered in Node.js. Background ========= Node.js is a JavaScript runtime built on Chrome’s V8 JavaScript engine. Affected packages ================ Package Vulnerable Unaffected --------------- ------------ ------------ net-libs/nodejs < 16.20.2 >= 16.20.2 Description ========== Multiple vulnerabilities have been discovered in Node.js. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All Node.js 20 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/nodejs-20.5.1" All Node.js 18 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/nodejs-18.17.1" All Node.js 16 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/nodejs-16.20.2" References ========= [ 1 ] CVE-2020-7774 https://nvd.nist.gov/vuln/detail/CVE-2020-7774 [ 2 ] CVE-2021-3672 https://nvd.nist.gov/vuln/detail/CVE-2021-3672 [ 3 ] CVE-2021-22883 https://nvd.nist.gov/vuln/detail/CVE-2021-22883 [ 4 ] CVE-2021-22884 https://nvd.nist.gov/vuln/detail/CVE-2021-22884 [ 5 ] CVE-2021-22918 https://nvd.nist.gov/vuln/detail/CVE-2021-22918 [ 6 ] CVE-2021-22930 https://nvd.nist.gov/vuln/detail/CVE-2021-22930 [ 7 ] CVE-2021-22931 https://nvd.nist.gov/vuln/detail/CVE-2021-22931 [ 8 ] CVE-2021-22939 https://nvd.nist.gov/vuln/detail/CVE-2021-22939 [ 9 ] CVE-2021-22940 https://nvd.nist.gov/vuln/detail/CVE-2021-22940 [ 10 ] CVE-2021-22959 https://nvd.nist.gov/vuln/detail/CVE-2021-22959 [ 11 ] CVE-2021-22960 https://nvd.nist.gov/vuln/detail/CVE-2021-22960 [ 12 ] CVE-2021-37701 https://nvd.nist.gov/vuln/detail/CVE-2021-37701 [ 13 ] CVE-2021-37712 https://nvd.nist.gov/vuln/detail/CVE-2021-37712 [ 14 ] CVE-2021-39134 https://nvd.nist.gov/vuln/detail/CVE-2021-39134 [ 15 ] CVE-2021-39135 https://nvd.nist.gov/vuln/detail/CVE-2021-39135 [ 16 ] CVE-2021-44531 https://nvd.nist.gov/vuln/detail/CVE-2021-44531 [ 17 ] CVE-2021-44532 https://nvd.nist.gov/vuln/detail/CVE-2021-44532 [ 18 ] CVE-2021-44533 https://nvd.nist.gov/vuln/detail/CVE-2021-44533 [ 19 ] CVE-2022-0778 https://nvd.nist.gov/vuln/detail/CVE-2022-0778 [ 20 ] CVE-2022-3602 https://nvd.nist.gov/vuln/detail/CVE-2022-3602 [ 21 ] CVE-2022-3786 https://nvd.nist.gov/vuln/detail/CVE-2022-3786 [ 22 ] CVE-2022-21824 https://nvd.nist.gov/vuln/detail/CVE-2022-21824 [ 23 ] CVE-2022-32212 https://nvd.nist.gov/vuln/detail/CVE-2022-32212 [ 24 ] CVE-2022-32213 https://nvd.nist.gov/vuln/detail/CVE-2022-32213 [ 25 ] CVE-2022-32214 https://nvd.nist.gov/vuln/detail/CVE-2022-32214 [ 26 ] CVE-2022-32215 https://nvd.nist.gov/vuln/detail/CVE-2022-32215 [ 27 ] CVE-2022-32222 https://nvd.nist.gov/vuln/detail/CVE-2022-32222 [ 28 ] CVE-2022-35255 https://nvd.nist.gov/vuln/detail/CVE-2022-35255 [ 29 ] CVE-2022-35256 https://nvd.nist.gov/vuln/detail/CVE-2022-35256 [ 30 ] CVE-2022-35948 https://nvd.nist.gov/vuln/detail/CVE-2022-35948 [ 31 ] CVE-2022-35949 https://nvd.nist.gov/vuln/detail/CVE-2022-35949 [ 32 ] CVE-2022-43548 https://nvd.nist.gov/vuln/detail/CVE-2022-43548 [ 33 ] CVE-2023-30581 https://nvd.nist.gov/vuln/detail/CVE-2023-30581 [ 34 ] CVE-2023-30582 https://nvd.nist.gov/vuln/detail/CVE-2023-30582 [ 35 ] CVE-2023-30583 https://nvd.nist.gov/vuln/detail/CVE-2023-30583 [ 36 ] CVE-2023-30584 https://nvd.nist.gov/vuln/detail/CVE-2023-30584 [ 37 ] CVE-2023-30586 https://nvd.nist.gov/vuln/detail/CVE-2023-30586 [ 38 ] CVE-2023-30587 https://nvd.nist.gov/vuln/detail/CVE-2023-30587 [ 39 ] CVE-2023-30588 https://nvd.nist.gov/vuln/detail/CVE-2023-30588 [ 40 ] CVE-2023-30589 https://nvd.nist.gov/vuln/detail/CVE-2023-30589 [ 41 ] CVE-2023-30590 https://nvd.nist.gov/vuln/detail/CVE-2023-30590 [ 42 ] CVE-2023-32002 https://nvd.nist.gov/vuln/detail/CVE-2023-32002 [ 43 ] CVE-2023-32003 https://nvd.nist.gov/vuln/detail/CVE-2023-32003 [ 44 ] CVE-2023-32004 https://nvd.nist.gov/vuln/detail/CVE-2023-32004 [ 45 ] CVE-2023-32005 https://nvd.nist.gov/vuln/detail/CVE-2023-32005 [ 46 ] CVE-2023-32006 https://nvd.nist.gov/vuln/detail/CVE-2023-32006 [ 47 ] CVE-2023-32558 https://nvd.nist.gov/vuln/detail/CVE-2023-32558 [ 48 ] CVE-2023-32559 https://nvd.nist.gov/vuln/detail/CVE-2023-32559 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202405-29 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2024 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . ========================================================================== Ubuntu Security Notice USN-6457-1 October 30, 2023 nodejs vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS Summary: Several security issues were fixed in Node.js. Software Description: - nodejs: An open-source, cross-platform JavaScript runtime environment. Details: Tavis Ormandy discovered that Node.js incorrectly handled certain inputs. (CVE-2022-0778) Elison Niven discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2022-1292) Chancen and Daniel Fiala discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2022-2068) Alex Chernyakhovsky discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2022-2097) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: libnode-dev 12.22.9~dfsg-1ubuntu3.1 libnode72 12.22.9~dfsg-1ubuntu3.1 nodejs 12.22.9~dfsg-1ubuntu3.1 nodejs-doc 12.22.9~dfsg-1ubuntu3.1 In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: openssl security update Advisory ID: RHSA-2022:1077-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:1077 Issue date: 2022-03-28 CVE Names: CVE-2022-0778 ==================================================================== 1. Summary: An update for openssl is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.7) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.7) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.7) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.7) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.7) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.7) - x86_64 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 5. Package List: Red Hat Enterprise Linux Server AUS (v. 7.7): Source: openssl-1.0.2k-21.el7_7.src.rpm x86_64: openssl-1.0.2k-21.el7_7.x86_64.rpm openssl-debuginfo-1.0.2k-21.el7_7.i686.rpm openssl-debuginfo-1.0.2k-21.el7_7.x86_64.rpm openssl-devel-1.0.2k-21.el7_7.i686.rpm openssl-devel-1.0.2k-21.el7_7.x86_64.rpm openssl-libs-1.0.2k-21.el7_7.i686.rpm openssl-libs-1.0.2k-21.el7_7.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.7): Source: openssl-1.0.2k-21.el7_7.src.rpm ppc64le: openssl-1.0.2k-21.el7_7.ppc64le.rpm openssl-debuginfo-1.0.2k-21.el7_7.ppc64le.rpm openssl-devel-1.0.2k-21.el7_7.ppc64le.rpm openssl-libs-1.0.2k-21.el7_7.ppc64le.rpm x86_64: openssl-1.0.2k-21.el7_7.x86_64.rpm openssl-debuginfo-1.0.2k-21.el7_7.i686.rpm openssl-debuginfo-1.0.2k-21.el7_7.x86_64.rpm openssl-devel-1.0.2k-21.el7_7.i686.rpm openssl-devel-1.0.2k-21.el7_7.x86_64.rpm openssl-libs-1.0.2k-21.el7_7.i686.rpm openssl-libs-1.0.2k-21.el7_7.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 7.7): Source: openssl-1.0.2k-21.el7_7.src.rpm x86_64: openssl-1.0.2k-21.el7_7.x86_64.rpm openssl-debuginfo-1.0.2k-21.el7_7.i686.rpm openssl-debuginfo-1.0.2k-21.el7_7.x86_64.rpm openssl-devel-1.0.2k-21.el7_7.i686.rpm openssl-devel-1.0.2k-21.el7_7.x86_64.rpm openssl-libs-1.0.2k-21.el7_7.i686.rpm openssl-libs-1.0.2k-21.el7_7.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 7.7): x86_64: openssl-debuginfo-1.0.2k-21.el7_7.i686.rpm openssl-debuginfo-1.0.2k-21.el7_7.x86_64.rpm openssl-perl-1.0.2k-21.el7_7.x86_64.rpm openssl-static-1.0.2k-21.el7_7.i686.rpm openssl-static-1.0.2k-21.el7_7.x86_64.rpm Red Hat Enterprise Linux Server Optional E4S (v. 7.7): ppc64le: openssl-debuginfo-1.0.2k-21.el7_7.ppc64le.rpm openssl-perl-1.0.2k-21.el7_7.ppc64le.rpm openssl-static-1.0.2k-21.el7_7.ppc64le.rpm x86_64: openssl-debuginfo-1.0.2k-21.el7_7.i686.rpm openssl-debuginfo-1.0.2k-21.el7_7.x86_64.rpm openssl-perl-1.0.2k-21.el7_7.x86_64.rpm openssl-static-1.0.2k-21.el7_7.i686.rpm openssl-static-1.0.2k-21.el7_7.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 7.7): x86_64: openssl-debuginfo-1.0.2k-21.el7_7.i686.rpm openssl-debuginfo-1.0.2k-21.el7_7.x86_64.rpm openssl-perl-1.0.2k-21.el7_7.x86_64.rpm openssl-static-1.0.2k-21.el7_7.i686.rpm openssl-static-1.0.2k-21.el7_7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-0778 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYkHUr9zjgjWX9erEAQhkHQ//TKBrMV721kVVZUQwH24yK+5Owx085P9k XoKjwPfx5h/WLsQCXuGE9Ptsqdkl23zuwBkC/91HuGw2lOE/ap+fFjgZuDsCNoPy tg4qTIqRtvIkvvNF1U8JMmaahTegmAzdFCxIAYKkBMsQRIptX6tDrBgTv5279fj4 TY8RA1Kj9Z2SLXFc/rcEUqDb5yKDJ0mvGzQl9VzBx9OKJbLkUReLQRcq5X5SbAyp PICvHr9TCX5OVS870tsw+yTQD0xIDPtUY8Abcb5lCHNbA1QJSwvm+dbMErhuiWtI Rg6M9Ny5/VochcblHbfiNluI3NrbpSIqUCtz7xNeNvL1tU0pObAAgNZLunkwXE8S zy9W4U2RNFowQiBSYQe73CiI+RER0HxkolRzqoV2SeuIKQPTE/YjtSc977XvKy26 0z9qLGU+kvJiD/gh69SkTTH23y97gUE4qL92wJl+JNnFZmNHj1nRBjvY8Q1dnC+/ EJz98v1HvsScSbSSQsopgAZgJ+wJT+ZN0sZa78CLh4av/ISo6ri5dbE3C+F+JH3k cVjDU3v58rStC5M2KAIlroOhuZSUEYb4iUVEraubg2ItEeGnTCAif2msKPx7R94d SZ3MLJ3zjyZ8SKRyKbT8f0Fmn3SuxC26K4B6iQ4kiUmiYtn58OPIIygga6lJAWn1 9J7/f8KjwEA=6u6P -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.34

sources: NVD: CVE-2022-0778 // JVNDB: JVNDB-2022-001476 // VULMON: CVE-2022-0778 // PACKETSTORM: 168011 // PACKETSTORM: 167640 // PACKETSTORM: 166811 // PACKETSTORM: 166805 // PACKETSTORM: 178512 // PACKETSTORM: 175432 // PACKETSTORM: 166495

AFFECTED PRODUCTS

vendor:日立model:ucosminexus application serverscope: - version: -

Trust: 1.6

vendor:日立model:ucosminexus service platformscope: - version: -

Trust: 1.6

vendor:日立model:ucosminexus primary server basescope: - version: -

Trust: 1.6

vendor:nodejsmodel:node.jsscope:gteversion:14.15.0

Trust: 1.0

vendor:tenablemodel:nessusscope:gteversion:10.0.0

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.2.42

Trust: 1.0

vendor:netappmodel:santricity smi-s providerscope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

vendor:tenablemodel:nessusscope:ltversion:10.1.2

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gtversion:16.0.0

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:1.1.1n

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:12.13.0

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:1.0.2zd

Trust: 1.0

vendor:netappmodel:a250scope:eqversion: -

Trust: 1.0

vendor:tenablemodel:nessusscope:ltversion:8.15.4

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.7.2

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.7.0

Trust: 1.0

vendor:netappmodel:clustered data ontapscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:3.0.2

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:3.0.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:lteversion:14.14.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gtversion:17.0.0

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.4.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:lteversion:12.12.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:14.19.1

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.2.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:36

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:16.13.0

Trust: 1.0

vendor:netappmodel:storagegridscope:eqversion: -

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.2

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.6.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:12.22.11

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.5.14

Trust: 1.0

vendor:netappmodel:clustered data ontap antivirus connectorscope:eqversion: -

Trust: 1.0

vendor:netappmodel:cloud volumes ontap mediatorscope:eqversion: -

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.3.33

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.4.23

Trust: 1.0

vendor:mariadbmodel:mariadbscope:ltversion:10.6.6

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.1.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:17.7.2

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.5.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gtversion:14.0.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:12.0.0

Trust: 1.0

vendor:mariadbmodel:mariadbscope:gteversion:10.3.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:16.14.2

Trust: 1.0

vendor:nodejsmodel:node.jsscope:lteversion:16.12.0

Trust: 1.0

vendor:netappmodel:500fscope:eqversion: -

Trust: 1.0

vendor:日本電気model:nec enhanced video analyticsscope: - version: -

Trust: 0.8

vendor:日立model:日立アドバンストサーバ ha8000v シリーズscope: - version: -

Trust: 0.8

vendor:日立model:日立高信頼サーバ rv3000scope: - version: -

Trust: 0.8

vendor:日本電気model:neoface monitorscope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus application server-rscope: - version: -

Trust: 0.8

vendor:日立model:jp1/file transmission server/ftpscope: - version: -

Trust: 0.8

vendor:日本電気model:esmpro/serveragentscope: - version: -

Trust: 0.8

vendor:日本電気model:nec cyber security platformscope: - version: -

Trust: 0.8

vendor:opensslmodel:opensslscope: - version: -

Trust: 0.8

vendor:日本電気model:mission critical mailscope: - version: -

Trust: 0.8

vendor:日本電気model:webotx application serverscope: - version: -

Trust: 0.8

vendor:日立model:jp1/performance managementscope: - version: -

Trust: 0.8

vendor:日本電気model:univergescope: - version: -

Trust: 0.8

vendor:日本電気model:ix ルータscope: - version: -

Trust: 0.8

vendor:日本電気model:connexive application platformscope: - version: -

Trust: 0.8

vendor:日立model:jp1/basescope: - version: -

Trust: 0.8

vendor:日本電気model:nec エッジゲートウェイscope: - version: -

Trust: 0.8

vendor:日本電気model:nec ai acceleratorscope: - version: -

Trust: 0.8

vendor:日本電気model:esmpro/serveragentservicescope: - version: -

Trust: 0.8

vendor:日本電気model:istoragemanagerscope: - version: -

Trust: 0.8

vendor:日本電気model:webotx sip application serverscope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus service architectscope: - version: -

Trust: 0.8

vendor:日本電気model:ismサーバscope: - version: -

Trust: 0.8

vendor:日本電気model:simpwrightscope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus developerscope: - version: -

Trust: 0.8

vendor:日本電気model:connexive pfscope: - version: -

Trust: 0.8

vendor:日立model:cosminexus http serverscope: - version: -

Trust: 0.8

vendor:日本電気model:istoragemanager expressscope: - version: -

Trust: 0.8

vendor:日本電気model:witchymailscope: - version: -

Trust: 0.8

vendor:日立model:jp1/automatic job management system 3scope: - version: -

Trust: 0.8

vendor:日本電気model:iot 共通基盤scope: - version: -

Trust: 0.8

vendor:日本電気model:actsecure ポータルscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-001476 // NVD: CVE-2022-0778

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-0778
value: HIGH

Trust: 1.0

NVD: CVE-2022-0778
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202203-1394
value: HIGH

Trust: 0.6

VULMON: CVE-2022-0778
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-0778
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2022-0778
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2022-0778
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2022-0778 // JVNDB: JVNDB-2022-001476 // CNNVD: CNNVD-202203-1394 // NVD: CVE-2022-0778

PROBLEMTYPE DATA

problemtype:CWE-835

Trust: 1.0

problemtype:infinite loop (CWE-835) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-001476 // NVD: CVE-2022-0778

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 168011 // PACKETSTORM: 175432 // CNNVD: CNNVD-202203-1394

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202203-1394

PATCH

title:hitachi-sec-2022-132 Software product security informationurl:https://www.openssl.org/news/secadv/20220315.txt

Trust: 0.8

title:OpenSSL Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=203682

Trust: 0.6

title:Amazon Linux AMI: ALAS-2022-1575url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2022-1575

Trust: 0.1

title:Debian Security Advisories: DSA-5103-1 openssl -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=4ecbdda56426ff105b6a2939daf5c4e7

Trust: 0.1

title:Red Hat: Important: openssl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221077 - Security Advisory

Trust: 0.1

title:Red Hat: Important: openssl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221078 - Security Advisory

Trust: 0.1

title:Red Hat: Important: openssl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221082 - Security Advisory

Trust: 0.1

title:Red Hat: Important: openssl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221073 - Security Advisory

Trust: 0.1

title:Red Hat: Important: openssl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221091 - Security Advisory

Trust: 0.1

title:Red Hat: Important: openssl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221076 - Security Advisory

Trust: 0.1

title:Red Hat: Important: openssl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221071 - Security Advisory

Trust: 0.1

title:Red Hat: Low: compat-openssl10 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225326 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Web Server 5.6.2 Security Updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221520 - Security Advisory

Trust: 0.1

title:Red Hat: Important: openssl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221112 - Security Advisory

Trust: 0.1

title:Red Hat: Important: compat-openssl11 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224899 - Security Advisory

Trust: 0.1

title:Red Hat: Important: openssl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221065 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Web Server 5.6.2 Security Updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221519 - Security Advisory

Trust: 0.1

title:Red Hat: Important: openssl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221066 - Security Advisory

Trust: 0.1

title:Amazon Linux 2: ALAS2-2022-1766url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2022-1766

Trust: 0.1

title:Amazon Linux 2: ALAS2NITRO-ENCLAVES-2022-018url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2NITRO-ENCLAVES-2022-018

Trust: 0.1

title:Red Hat: url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2022-0778

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.10.10 security and extras updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221357 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.9.29 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221363 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.8.37 security and extras updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221370 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.10.10 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221356 - Security Advisory

Trust: 0.1

title:Tenable Security Advisories: [R1] Nessus Agent Versions 8.3.3 and 10.1.3 Fix One Third-Party Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2022-07

Trust: 0.1

title:Tenable Security Advisories: [R1] Nessus Versions 8.15.4 and 10.1.2 Fix One Third-Party Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2022-06

Trust: 0.1

title:Tenable Security Advisories: [R1] Stand-alone Security Patch Available for Tenable.sc versions 5.19.0 to 5.20.1: Patch 202204.1url:https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2022-08

Trust: 0.1

title:Amazon Linux 2022: ALAS2022-2022-041url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022&qid=ALAS2022-2022-041

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221390 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Virtualization 4.10.1 Images security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224668 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP11 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221389 - Security Advisory

Trust: 0.1

title:Hitachi Security Advisories: Vulnerability in Hitachi Configuration Manager and Hitachi Ops Center API Configuration Managerurl:https://vulmon.com/vendoradvisory?qidtp=hitachi_security_advisories&qid=hitachi-sec-2022-121

Trust: 0.1

title:Hitachi Security Advisories: Vulnerability in JP1url:https://vulmon.com/vendoradvisory?qidtp=hitachi_security_advisories&qid=hitachi-sec-2022-132

Trust: 0.1

title:Hitachi Security Advisories: Vulnerability in Cosminexus HTTP Serverurl:https://vulmon.com/vendoradvisory?qidtp=hitachi_security_advisories&qid=hitachi-sec-2022-118

Trust: 0.1

title:Red Hat: Moderate: Red Hat OpenShift Service Mesh 2.1.2.1 containers security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221739 - Security Advisory

Trust: 0.1

title:Brocade Security Advisories: Access Deniedurl:https://vulmon.com/vendoradvisory?qidtp=brocade_security_advisories&qid=af28f1c934f899990fae4f8d3f165957

Trust: 0.1

title:Palo Alto Networks Security Advisory: CVE-2022-0778 Impact of the OpenSSL Infinite Loop Vulnerability CVE-2022-0778url:https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory&qid=aae1a589daaf238d6814b018feedaec7

Trust: 0.1

title:Red Hat: Important: RHV-H security update (redhat-virtualization-host) 4.3.22url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221263 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat OpenShift GitOps security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224690 - Security Advisory

Trust: 0.1

title:Red Hat: Important: RHACS 3.68 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225132 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat OpenShift Logging Security and Bug update Release 5.4.1url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222216 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Openshift Logging Security and Bug update Release (5.2.10)url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222218 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat OpenShift Logging Security and Bug update Release 5.3.7url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222217 - Security Advisory

Trust: 0.1

title:Hitachi Security Advisories: Multiple Vulnerabilities in Hitachi Ops Center Analyzer, Hitachi Ops Center Analyzer viewpoint and Hitachi Ops Center Viewpointurl:https://vulmon.com/vendoradvisory?qidtp=hitachi_security_advisories&qid=hitachi-sec-2022-126

Trust: 0.1

title:Tenable Security Advisories: [R1] Tenable.sc 5.21.0 Fixes Multiple Third-Party Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2022-09

Trust: 0.1

title:Palo Alto Networks Security Advisory: CVE-2022-22963 Informational: Impact of Spring Vulnerabilities CVE-2022-22963 and CVE-2010-1622 Bypassurl:https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory&qid=bb2470489013d7c39502e755acaa670b

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.6.57 security and extras updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221622 - Security Advisory

Trust: 0.1

title:Red Hat: Low: Release of OpenShift Serverless Version 1.22.0url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221747 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Migration Toolkit for Containers (MTC) 1.7.1 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221734 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Migration Toolkit for Containers (MTC) 1.7.3 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225840 - Security Advisory

Trust: 0.1

title:Hitachi Security Advisories: Multiple Vulnerabilities in Hitachi Command Suite, Hitachi Automation Director, Hitachi Configuration Manager, Hitachi Infrastructure Analytics Advisor and Hitachi Ops Centerurl:https://vulmon.com/vendoradvisory?qidtp=hitachi_security_advisories&qid=hitachi-sec-2023-126

Trust: 0.1

title:Red Hat: Moderate: Red Hat Advanced Cluster Management 2.4.3 security updates and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221476 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.11.0 extras and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225070 - Security Advisory

Trust: 0.1

title:Apple: macOS Monterey 12.4url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=73857ee26a600b1527481f1deacc0619

Trust: 0.1

title:Red Hat: Important: Red Hat Advanced Cluster Management 2.5 security updates, images, and bug fixesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224956 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Virtualization 4.11.0 Images security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20226526 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Migration Toolkit for Containers (MTC) 1.5.4 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221396 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Service Telemetry Framework 1.4 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225924 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 4.11.0 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225069 - Security Advisory

Trust: 0.1

title:Amazon Linux 2: ALASMARIADB10.5-2023-003url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALASMARIADB10.5-2023-003

Trust: 0.1

title:Amazon Linux 2022: ALAS2022-2022-182url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022&qid=ALAS2022-2022-182

Trust: 0.1

title:CVE-2022-0778url:https://github.com/jeongjunsoo/CVE-2022-0778

Trust: 0.1

sources: VULMON: CVE-2022-0778 // JVNDB: JVNDB-2022-001476 // CNNVD: CNNVD-202203-1394

EXTERNAL IDS

db:NVDid:CVE-2022-0778

Trust: 4.0

db:PACKETSTORMid:167344

Trust: 1.6

db:SIEMENSid:SSA-712929

Trust: 1.6

db:TENABLEid:TNS-2022-09

Trust: 1.6

db:TENABLEid:TNS-2022-08

Trust: 1.6

db:TENABLEid:TNS-2022-06

Trust: 1.6

db:TENABLEid:TNS-2022-07

Trust: 1.6

db:JVNid:JVNVU91676340

Trust: 0.8

db:JVNid:JVNVU96890975

Trust: 0.8

db:JVNid:JVNVU91198149

Trust: 0.8

db:JVNid:JVNVU99682885

Trust: 0.8

db:JVNid:JVNVU98905589

Trust: 0.8

db:JVNid:JVNVU90813125

Trust: 0.8

db:ICS CERTid:ICSA-24-046-02

Trust: 0.8

db:ICS CERTid:ICSA-22-272-02

Trust: 0.8

db:ICS CERTid:ICSA-23-143-02

Trust: 0.8

db:ICS CERTid:ICSA-23-059-01

Trust: 0.8

db:JVNDBid:JVNDB-2022-001476

Trust: 0.8

db:PACKETSTORMid:167640

Trust: 0.7

db:PACKETSTORMid:166811

Trust: 0.7

db:CS-HELPid:SB2022070805

Trust: 0.6

db:CS-HELPid:SB2022052401

Trust: 0.6

db:CS-HELPid:SB2022070422

Trust: 0.6

db:CS-HELPid:SB2022033116

Trust: 0.6

db:CS-HELPid:SB2022042576

Trust: 0.6

db:CS-HELPid:SB2022051736

Trust: 0.6

db:CS-HELPid:SB2022050424

Trust: 0.6

db:CS-HELPid:SB2022031630

Trust: 0.6

db:CS-HELPid:SB2022072010

Trust: 0.6

db:CS-HELPid:SB2022072612

Trust: 0.6

db:CS-HELPid:SB2022032426

Trust: 0.6

db:CS-HELPid:SB2022051402

Trust: 0.6

db:CS-HELPid:SB2022060716

Trust: 0.6

db:CS-HELPid:SB2022062021

Trust: 0.6

db:CS-HELPid:SB2022063004

Trust: 0.6

db:CS-HELPid:SB2022031720

Trust: 0.6

db:CS-HELPid:SB2022051235

Trust: 0.6

db:CS-HELPid:SB2022042017

Trust: 0.6

db:CS-HELPid:SB2022032126

Trust: 0.6

db:CS-HELPid:SB2022041522

Trust: 0.6

db:CS-HELPid:SB2022060811

Trust: 0.6

db:CS-HELPid:SB2022051703

Trust: 0.6

db:CS-HELPid:SB2022032829

Trust: 0.6

db:CS-HELPid:SB2022072709

Trust: 0.6

db:CS-HELPid:SB2022071129

Trust: 0.6

db:CS-HELPid:SB2022031522

Trust: 0.6

db:CS-HELPid:SB2022060511

Trust: 0.6

db:CS-HELPid:SB2022070108

Trust: 0.6

db:CS-HELPid:SB2022071314

Trust: 0.6

db:CS-HELPid:SB2022042143

Trust: 0.6

db:CS-HELPid:SB2022070605

Trust: 0.6

db:CS-HELPid:SB2022041950

Trust: 0.6

db:CS-HELPid:SB2022071407

Trust: 0.6

db:CS-HELPid:SB2022071815

Trust: 0.6

db:CS-HELPid:SB2022032931

Trust: 0.6

db:CS-HELPid:SB2022040715

Trust: 0.6

db:ICS CERTid:ICSA-22-167-14

Trust: 0.6

db:ICS CERTid:ICSA-22-221-01

Trust: 0.6

db:ICS CERTid:ICSA-22-132-02

Trust: 0.6

db:PACKETSTORMid:167379

Trust: 0.6

db:PACKETSTORMid:167189

Trust: 0.6

db:PACKETSTORMid:166525

Trust: 0.6

db:PACKETSTORMid:167008

Trust: 0.6

db:PACKETSTORMid:166638

Trust: 0.6

db:PACKETSTORMid:166954

Trust: 0.6

db:PACKETSTORMid:166497

Trust: 0.6

db:PACKETSTORMid:167555

Trust: 0.6

db:PACKETSTORMid:168714

Trust: 0.6

db:PACKETSTORMid:166818

Trust: 0.6

db:PACKETSTORMid:166341

Trust: 0.6

db:PACKETSTORMid:167142

Trust: 0.6

db:PACKETSTORMid:166983

Trust: 0.6

db:PACKETSTORMid:167226

Trust: 0.6

db:PACKETSTORMid:167405

Trust: 0.6

db:AUSCERTid:ESB-2022.2778

Trust: 0.6

db:AUSCERTid:ESB-2022.4601

Trust: 0.6

db:AUSCERTid:ESB-2022.3977

Trust: 0.6

db:AUSCERTid:ESB-2022.2361

Trust: 0.6

db:AUSCERTid:ESB-2022.2016

Trust: 0.6

db:AUSCERTid:ESB-2022.1170

Trust: 0.6

db:AUSCERTid:ESB-2022.3022

Trust: 0.6

db:AUSCERTid:ESB-2022.2509.3

Trust: 0.6

db:AUSCERTid:ESB-2022.4151

Trust: 0.6

db:AUSCERTid:ESB-2022.2855

Trust: 0.6

db:AUSCERTid:ESB-2022.1416

Trust: 0.6

db:AUSCERTid:ESB-2022.1373

Trust: 0.6

db:AUSCERTid:ESB-2022.1155

Trust: 0.6

db:AUSCERTid:ESB-2022.2191

Trust: 0.6

db:AUSCERTid:ESB-2022.3344

Trust: 0.6

db:AUSCERTid:ESB-2022.1677

Trust: 0.6

db:AUSCERTid:ESB-2022.3930

Trust: 0.6

db:AUSCERTid:ESB-2022.3821

Trust: 0.6

db:AUSCERTid:ESB-2022.1792

Trust: 0.6

db:AUSCERTid:ESB-2022.2418

Trust: 0.6

db:AUSCERTid:ESB-2022.1139

Trust: 0.6

db:AUSCERTid:ESB-2022.2476

Trust: 0.6

db:AUSCERTid:ESB-2022.3020

Trust: 0.6

db:AUSCERTid:ESB-2022.3299

Trust: 0.6

db:AUSCERTid:ESB-2022.1343

Trust: 0.6

db:AUSCERTid:ESB-2022.1507

Trust: 0.6

db:AUSCERTid:ESB-2022.1103

Trust: 0.6

db:CNNVDid:CNNVD-202203-1394

Trust: 0.6

db:VULMONid:CVE-2022-0778

Trust: 0.1

db:PACKETSTORMid:168011

Trust: 0.1

db:PACKETSTORMid:166805

Trust: 0.1

db:PACKETSTORMid:178512

Trust: 0.1

db:PACKETSTORMid:175432

Trust: 0.1

db:PACKETSTORMid:166495

Trust: 0.1

sources: VULMON: CVE-2022-0778 // PACKETSTORM: 168011 // PACKETSTORM: 167640 // PACKETSTORM: 166811 // PACKETSTORM: 166805 // PACKETSTORM: 178512 // PACKETSTORM: 175432 // PACKETSTORM: 166495 // JVNDB: JVNDB-2022-001476 // CNNVD: CNNVD-202203-1394 // NVD: CVE-2022-0778

REFERENCES

url:https://www.oracle.com/security-alerts/cpuapr2022.html

Trust: 2.2

url:http://packetstormsecurity.com/files/167344/openssl-1.0.2-1.1.1-3.0-bn_mod_sqrt-infinite-loop.html

Trust: 2.2

url:https://security.netapp.com/advisory/ntap-20220429-0005/

Trust: 1.6

url:http://seclists.org/fulldisclosure/2022/may/33

Trust: 1.6

url:https://www.openssl.org/news/secadv/20220315.txt

Trust: 1.6

url:https://www.debian.org/security/2022/dsa-5103

Trust: 1.6

url:https://www.oracle.com/security-alerts/cpujul2022.html

Trust: 1.6

url:https://support.apple.com/kb/ht213255

Trust: 1.6

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2022-0002

Trust: 1.6

url:http://seclists.org/fulldisclosure/2022/may/38

Trust: 1.6

url:https://support.apple.com/kb/ht213257

Trust: 1.6

url:https://support.apple.com/kb/ht213256

Trust: 1.6

url:http://seclists.org/fulldisclosure/2022/may/35

Trust: 1.6

url:https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html

Trust: 1.6

url:https://security.gentoo.org/glsa/202210-02

Trust: 1.6

url:https://security.netapp.com/advisory/ntap-20220321-0002/

Trust: 1.6

url:https://www.tenable.com/security/tns-2022-07

Trust: 1.6

url:https://www.tenable.com/security/tns-2022-06

Trust: 1.6

url:https://www.tenable.com/security/tns-2022-09

Trust: 1.6

url:https://www.tenable.com/security/tns-2022-08

Trust: 1.6

url:https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html

Trust: 1.6

url:https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-0778

Trust: 1.4

url:https://access.redhat.com/security/cve/cve-2022-0778

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/gdb3gqvjpxje7x5c5jn6jaa4xudwd6e6/

Trust: 1.0

url:https://git.openssl.org/gitweb/?p=openssl.git%3ba=commitdiff%3bh=380085481c64de749a6dd25cdf0bcf4360b30f83

Trust: 1.0

url:https://git.openssl.org/gitweb/?p=openssl.git%3ba=commitdiff%3bh=a466912611aa6cbdf550cd10601390e587451246

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323snn6zx7prjjwp2buaflpuae42xwlz/

Trust: 1.0

url:https://security.netapp.com/advisory/ntap-20240621-0006/

Trust: 1.0

url:https://git.openssl.org/gitweb/?p=openssl.git%3ba=commitdiff%3bh=3118eb64934499d93db3230748a452351d1d9a65

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/w6k3pr542dxwleffmfidmme4cwmhjrmg/

Trust: 1.0

url:https://jvn.jp/vu/jvnvu90813125/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99682885/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu98905589/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu96890975/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91676340/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91198149/index.html

Trust: 0.8

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-272-02

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-059-01

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-02

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-046-02

Trust: 0.8

url:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246

Trust: 0.6

url:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/w6k3pr542dxwleffmfidmme4cwmhjrmg/

Trust: 0.6

url:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/gdb3gqvjpxje7x5c5jn6jaa4xudwd6e6/

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323snn6zx7prjjwp2buaflpuae42xwlz/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022051736

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022042143

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1373

Trust: 0.6

url:https://packetstormsecurity.com/files/167640/red-hat-security-advisory-2022-5326-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1170

Trust: 0.6

url:https://packetstormsecurity.com/files/166525/red-hat-security-advisory-2022-1112-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022040715

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2191

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022063004

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070805

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072709

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022032426

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070605

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071815

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2476

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022033116

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022051703

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070422

Trust: 0.6

url:https://packetstormsecurity.com/files/167405/red-hat-security-advisory-2022-4899-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022042576

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022060811

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022041522

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022042017

Trust: 0.6

url:https://packetstormsecurity.com/files/166638/red-hat-security-advisory-2022-1263-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/166954/red-hat-security-advisory-2022-1622-01.html

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-0778/

Trust: 0.6

url:https://support.apple.com/en-us/ht213256

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2361

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022032931

Trust: 0.6

url:https://packetstormsecurity.com/files/166811/red-hat-security-advisory-2022-1363-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/167226/red-hat-security-advisory-2022-4668-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3299

Trust: 0.6

url:https://packetstormsecurity.com/files/167008/red-hat-security-advisory-2022-1747-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022051235

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022052401

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-167-14

Trust: 0.6

url:https://packetstormsecurity.com/files/168714/gentoo-linux-security-advisory-202210-02.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3930

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022031522

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022031720

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1677

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022050424

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-221-01

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3977

Trust: 0.6

url:https://packetstormsecurity.com/files/166983/red-hat-security-advisory-2022-1739-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1155

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1792

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022041950

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2509.3

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022060511

Trust: 0.6

url:https://packetstormsecurity.com/files/166818/red-hat-security-advisory-2022-1356-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4151

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3020

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3022

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070108

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1507

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3344

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071314

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022031630

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022032126

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2016

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022051402

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3821

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022032829

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1103

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2778

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2855

Trust: 0.6

url:https://packetstormsecurity.com/files/166497/red-hat-security-advisory-2022-1076-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1343

Trust: 0.6

url:https://packetstormsecurity.com/files/167142/red-hat-security-advisory-2022-2216-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2418

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb20220720108

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022060716

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-132-02

Trust: 0.6

url:https://packetstormsecurity.com/files/167555/red-hat-security-advisory-2022-5132-01.html

Trust: 0.6

url:https://vigilance.fr/vulnerability/openssl-overload-via-bn-mod-sqrt-37745

Trust: 0.6

url:https://packetstormsecurity.com/files/166341/openssl-toolkit-1.1.1n.html

Trust: 0.6

url:https://packetstormsecurity.com/files/167189/apple-security-advisory-2022-05-16-4.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022062021

Trust: 0.6

url:https://packetstormsecurity.com/files/167379/red-hat-security-advisory-2022-1357-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071407

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1416

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072612

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1139

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071129

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4601

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-3518

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3541

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3537

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3517

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3516

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-37750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3867

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9805

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3894

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3899

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-30761

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8743

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-14502

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8743

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8823

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-10228

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000858

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3900

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9894

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33938

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27618

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8782

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-10228

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8771

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9952

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8846

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24407

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9915

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1271

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8783

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8625

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3326

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8813

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9806

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3885

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9802

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20305

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8764

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22946

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8769

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8710

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000858

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10018

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9895

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8811

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8710

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-14502

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15358

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8819

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3862

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13050

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25032

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3868

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29361

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-9169

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3895

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3865

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33930

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14391

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3864

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9862

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33929

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29362

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8835

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14889

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8816

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8927

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3897

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8808

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13627

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3520

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20454

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8625

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-27218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22947

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8766

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11793

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9803

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3521

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9850

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-25013

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-30666

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33928

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30631

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8820

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9893

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23852

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14889

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-1730

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8844

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3902

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5924

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8814

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13434

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8812

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-25013

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8815

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9843

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20454

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-3901

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-8720

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-25032

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-30762

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13050

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13627

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29363

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9925

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15503

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8720

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#low

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5326

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24769

Trust: 0.1

url:https://access.redhat.com/errata/rhba-2022:1362

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1363

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-24769

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1389

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3537

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-22720

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3517

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-22720

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3541

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23308

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23308

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3518

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3516

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22960

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30587

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-32006

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22931

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22939

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-32558

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30588

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21824

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3672

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44532

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-35949

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22959

Trust: 0.1

url:https://security.gentoo.org/glsa/202405-29

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22918

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-32004

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-43548

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30584

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-7774

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30589

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-32003

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32212

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22883

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32214

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22884

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-35948

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-35255

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44533

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-32002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30582

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3602

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3786

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30590

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30586

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-35256

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32213

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32215

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22940

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-32005

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-32559

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22930

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39135

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39134

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30581

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37712

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30583

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44531

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37701

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1292

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2068

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6457-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2097

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/nodejs/12.22.9~dfsg-1ubuntu3.1

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1077

Trust: 0.1

sources: PACKETSTORM: 168011 // PACKETSTORM: 167640 // PACKETSTORM: 166811 // PACKETSTORM: 166805 // PACKETSTORM: 178512 // PACKETSTORM: 175432 // PACKETSTORM: 166495 // JVNDB: JVNDB-2022-001476 // CNNVD: CNNVD-202203-1394 // NVD: CVE-2022-0778

CREDITS

Mitsubishi Electric reported these vulnerabilities to CISA.

Trust: 0.6

sources: CNNVD: CNNVD-202203-1394

SOURCES

db:VULMONid:CVE-2022-0778
db:PACKETSTORMid:168011
db:PACKETSTORMid:167640
db:PACKETSTORMid:166811
db:PACKETSTORMid:166805
db:PACKETSTORMid:178512
db:PACKETSTORMid:175432
db:PACKETSTORMid:166495
db:JVNDBid:JVNDB-2022-001476
db:CNNVDid:CNNVD-202203-1394
db:NVDid:CVE-2022-0778

LAST UPDATE DATE

2025-08-11T20:43:20.292000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-0778date:2023-11-07T00:00:00
db:JVNDBid:JVNDB-2022-001476date:2024-06-20T06:36:00
db:CNNVDid:CNNVD-202203-1394date:2022-11-02T00:00:00
db:NVDid:CVE-2022-0778date:2024-11-21T06:39:22.540

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-0778date:2022-03-15T00:00:00
db:PACKETSTORMid:168011date:2022-08-09T14:36:05
db:PACKETSTORMid:167640date:2022-07-01T14:55:27
db:PACKETSTORMid:166811date:2022-04-21T15:11:30
db:PACKETSTORMid:166805date:2022-04-21T15:10:14
db:PACKETSTORMid:178512date:2024-05-09T15:46:44
db:PACKETSTORMid:175432date:2023-10-31T13:11:25
db:PACKETSTORMid:166495date:2022-03-28T15:54:04
db:JVNDBid:JVNDB-2022-001476date:2022-03-17T00:00:00
db:CNNVDid:CNNVD-202203-1394date:2022-03-09T00:00:00
db:NVDid:CVE-2022-0778date:2022-03-15T17:15:08.513