ID

VAR-202302-0195


CVE

CVE-2022-4450


TITLE

OpenSSL  Double release vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-003616

DESCRIPTION

The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue. OpenSSL has payload data 0 become a part-time worker PEM When creating a file, PEM_read_bio_ex() A double free vulnerability exists because when returns a failure code, it introduces a pointer to an already freed buffer into the header argument.Malicious by attacker PEM Denial of service by providing files ( crash ) It may be in a state. Bugs fixed (https://bugzilla.redhat.com/): 2139896 - Requested TSC frequency outside tolerance range & TSC scaling not supported 2145146 - CDI operator is not creating PrometheusRule resource with alerts if CDI resource is incorrect 2148383 - Migration metrics values are not sum up values from all VMIs 2149409 - HPP mounter deployment can't mount as unprivileged 2168489 - Overview -> Migrations - The ?Bandwidth consumption? Graph display with wrong values 2184435 - [cnv-4.12] virt-handler should not delete any pre-configured mediated devices i these are provided by an external provider 2222191 - [cnv-4.12] manually increasing the number of virt-api pods does not work 5. Summary: OpenShift Serverless version 1.29.0 contains a moderate security impact. Solution: For instructions on how to install and use OpenShift Serverless, see documentation linked from the References section. Bugs fixed (https://bugzilla.redhat.com/): 2174485 - CVE-2023-25173 containerd: Supplementary groups are not set up properly 2178358 - CVE-2022-41723 net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding 2178488 - CVE-2022-41725 golang: net/http, mime/multipart: denial of service from excessive resource consumption 2178492 - CVE-2022-41724 golang: crypto/tls: large handshake records may cause panics 2184481 - CVE-2023-24538 golang: html/template: backticks not treated as string delimiters 2184482 - CVE-2023-24536 golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption 2184483 - CVE-2023-24534 golang: net/http, net/textproto: denial of service from excessive memory allocation 2184484 - CVE-2023-24537 golang: go/parser: Infinite loop in parsing 2185507 - Release of OpenShift Serverless Serving 1.29.0 2185509 - Release of OpenShift Serverless Eventing 1.29.0 5. Description: Security Fix(es) * CVE-2023-29017 vm2: Sandbox Escape * CVE-2023-29199 vm2: Sandbox Escape * CVE-2023-30547 vm2: Sandbox Escape when exception sanitization 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied, and that you are running Multicluster Engine for Kubernetes version 2.0.7. See https://access.redhat.com/solutions/7007647 for instructions on how to apply this hotfix, as well as for information about when the hotfix has been superseded by a permanent fix and should be removed. Important: This hotfix is a temporary fix that will be supported until 30 days after the date when the next patch release of the product is released. After the 30-day period ends, you must either update to the latest patch release and remove this hotfix to continue receiving security updates and maintain support or upgrade to a newer feature release of the product. Bugs fixed (https://bugzilla.redhat.com/): 2185374 - CVE-2023-29017 vm2: sandbox escape 2187409 - CVE-2023-29199 vm2: Sandbox Escape 2187608 - CVE-2023-30547 vm2: Sandbox Escape when exception sanitization 5. Description: Red Hat Advanced Cluster Management for Kubernetes 2.7.3 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Security fix(es): * CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability 3. Bugs fixed (https://bugzilla.redhat.com/): 1971033 - CVE-2021-20329 mongo-go-driver: specific cstrings input may not be properly validated 2126276 - CVE-2021-43138 async: Prototype Pollution in async 2126277 - CVE-2022-25858 terser: insecure use of regular expressions leads to ReDoS 2150323 - CVE-2022-24999 express: "qs" prototype poisoning causes the hang of the node process 5. JIRA issues fixed (https://issues.redhat.com/): OSSM-3596 - Port istio-cni fix for RHEL9 to maistra-2.2 OSSM-3720 - Port egress-gateway wrong network gateway endpoints fix in maistra-2.2 OSSM-3783 - operator can deadlock when istiod deployment fails [maistra-2.2] 6. Summary: The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Description: The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift Container Platform 4.13.4 bug fix and security update Advisory ID: RHSA-2023:3614-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2023:3614 Issue date: 2023-06-22 CVE Names: CVE-2022-4304 CVE-2022-4450 CVE-2022-41723 CVE-2023-0215 CVE-2023-0361 CVE-2023-24329 CVE-2023-24540 ===================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.13.4 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.4. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHSA-2023:3612 Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes: https://docs.openshift.com/container-platform/4.13/release_notes/ocp-4-13-release-notes.html Security Fix(es): * net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. All OpenShift Container Platform 4.13 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.13/updating/updating-cluster-cli.html 3. Solution: For OpenShift Container Platform 4.13 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.13/release_notes/ocp-4-13-release-notes.html You may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags. The sha values for the release are (For x86_64 architecture) The image digest is sha256:e3fb8ace9881ae5428ae7f0ac93a51e3daa71fa215b5299cd3209e134cadfc9c (For s390x architecture) The image digest is sha256:52f4c09586047c61465a24ceed2f5724024f5a5ef25da46e6078330f0dac08b2 (For ppc64le architecture) The image digest is sha256:24763eafbee5a36c699bff8f4103bcfcd8fec9ef0c7fe30c0ab5c208bdab7044 (For aarch64 architecture) The image digest is sha256:13b14f0514d24d241d40ebacac9f15f93acebc4a7849e4740df49e65e48af424 All OpenShift Container Platform 4.13 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.13/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2178358 - CVE-2022-41723 net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding 5. JIRA issues fixed (https://issues.redhat.com/): OCPBUGS-11116 - [RHOCP 4.13] MetalLB operator should be able to run other than default service account OCPBUGS-11768 - [4.13] RHCOS misses udev rules for GCE PD NVMe disks OCPBUGS-11824 - MetalLB operator doesnt show up when disconnected env is selected in operator hub OCPBUGS-13374 - [4.13] Forced BMH reboot fails when image URL has changed OCPBUGS-14024 - Master stuck in a creating/deleting loop when drop vmsize field from the CPMS providerSpec OCPBUGS-14298 - Upgrade to OCP 4.13.0 stuck due to machine-config error 'failed to run- nmstatectl: exit status 1' OCPBUGS-14357 - [4.13] configure-ovs blocks ssh access to the node when unhealthy OCPBUGS-14410 - It must be possible to append a piece of FRR configuration to what MetalLB renders OCPBUGS-14436 - Metric for control plane upgrade time OCPBUGS-14490 - HostedClusterConfigOperator doesn't check OperatorHub object in the Hosted Cluster OCPBUGS-14571 - Check permission and accessibility of non-default SCs on vSphere platform for CSI OCPBUGS-14589 - container_network* metrics stop reporting after container restart OCPBUGS-14620 - KCM is not aware of the AWS Region ap-southeast-3 OCPBUGS-14635 - Maximum Number Of Egress IPs Supported OCPBUGS-14651 - disable debug pporf with unauthenticated port OCPBUGS-14672 - Should update with --include-local-oci-catalogs for --oci-registries-config options OCPBUGS-14801 - KCM is not aware of the AWS Region ap-southeast-3 OCPBUGS-14830 - MetalLB has a bad CSV for 4.13.3. Invalid service account OCPBUGS-14850 - Unable to do post-copy migration OCPBUGS-14860 - GCP XPN Private Cluster fails with no public zone OCPBUGS-14872 - Hypershift operator should honor 'hostedcluster.spec.configuration.ingress.loadBalancer.platform.aws.type' OCPBUGS-14895 - Do not fail creating cgroups OCPBUGS-14981 - place holder for log linking in 4.13.4 OCPBUGS-8681 - [GWAPI] the gateway pod and service are still there after deleting gateway resource 6. References: https://access.redhat.com/security/cve/CVE-2022-4304 https://access.redhat.com/security/cve/CVE-2022-4450 https://access.redhat.com/security/cve/CVE-2022-41723 https://access.redhat.com/security/cve/CVE-2023-0215 https://access.redhat.com/security/cve/CVE-2023-0361 https://access.redhat.com/security/cve/CVE-2023-24329 https://access.redhat.com/security/cve/CVE-2023-24540 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/articles/11258 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZJVrjNzjgjWX9erEAQhIHhAAhCXJNMPx8UUsQ4Zff6rFht4F3T7JTNYA BXxVKEeeuD0lVGhCDoolyeEZpN3qePrNvBhbl0YjBCbz0114y3bqaKA9vljIkeRT 5bzmyTlViCiwCoTy82kadUIi9+YvXoI3LEWmWEeOeGZFSpwM2OMpflJ591FJIwFt 9szRX9TWkzF3DoGH/GOVv1h2oLHMNquBE3/5vhosLCZ5o65V7F+TWz8UbVsgfHPV imszrxicBgsrKsAhql1Owr4T5TXcwM0xRXDnaxnnipb3eecXjZDpPf/nIjgumEjw cyE2LPQ9wQZ5e5QGRi+FThWYDpN2hsc9s1ymAzYc1dU7N3veXtKOMOAXsl0e9ePL zH7SAnbWiqI3MzQSO1An28DSqN6vg3aSW8WW+z6ti7QJQRiHqb7JiO/Mb33OqbI7 Bb2zoPy7WIJlrQCda3HfwzZfrhj70qQjqIx3Dtjx/12ZzPtI9bo4eSNBeW6Xkw/E c0iwkO412zsWaqLbvue90lrb+fSA6hMVjv7YtG/b2tFbXEigk9kA9OAmkNBA/n76 l7Fd8GUX6sA0OUMOMCOhsrtfxz10BHopMMxEuFcQh3EZDMzsrVvNjqSr0Shxv4Xx wB4gh3SS5eWT6cKC8P29Ly0PTnpI0GJ74o3odFjbEV1lpqs6vynDtjW9SyUICPeE R6c9v/00vMo= =P9KS -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.34

sources: NVD: CVE-2022-4450 // JVNDB: JVNDB-2022-003616 // PACKETSTORM: 174517 // PACKETSTORM: 172741 // PACKETSTORM: 171947 // PACKETSTORM: 171957 // PACKETSTORM: 172136 // PACKETSTORM: 172981 // PACKETSTORM: 172973 // PACKETSTORM: 173115

AFFECTED PRODUCTS

vendor:日立model:ucosminexus primary server basescope: - version: -

Trust: 1.6

vendor:日立model:ucosminexus application serverscope: - version: -

Trust: 1.6

vendor:日立model:ucosminexus service platformscope: - version: -

Trust: 1.6

vendor:stormshieldmodel:network securityscope:ltversion:4.3.16

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:3.0.8

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:4.6.3

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:3.0.0

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:4.4.0

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.1.1

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:4.0.0

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:1.1.1t

Trust: 1.0

vendor:日本電気model:neoface monitorscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage v300scope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus application server-rscope: - version: -

Trust: 0.8

vendor:日立model:jp1/data highway - serverscope: - version: -

Trust: 0.8

vendor:日本電気model:養殖魚サイズ測定自動化サービスscope: - version: -

Trust: 0.8

vendor:日立model:プログラミング環境 for javascope: - version: -

Trust: 0.8

vendor:日立model:jp1/service support starter editionscope: - version: -

Trust: 0.8

vendor:日本電気model:得選街・gcbscope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus developerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/service supportscope: - version: -

Trust: 0.8

vendor:日立model:hitachi configuration managerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/basescope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - operations directorscope: - version: -

Trust: 0.8

vendor:日立model:jp1/automatic job management system 3 - definitions assistantscope: - version: -

Trust: 0.8

vendor:日本電気model:connexive application platformscope: - version: -

Trust: 0.8

vendor:日立model:jp1/navigation platform for developersscope: - version: -

Trust: 0.8

vendor:日立model:jp1/automatic job management system 3 - managerscope: - version: -

Trust: 0.8

vendor:日本電気model:webotx application serverscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center administratorscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center common servicesscope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus service architectscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage t280scope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center analyzer viewpointscope: - version: -

Trust: 0.8

vendor:日本電気model:nec enhanced speech analysisscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - managerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/navigation platformscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center analyzerscope: - version: -

Trust: 0.8

vendor:日立model:cosminexus http serverscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center automatorscope: - version: -

Trust: 0.8

vendor:日立model:hitachi automation directorscope: - version: -

Trust: 0.8

vendor:日本電気model:connexive pfscope: - version: -

Trust: 0.8

vendor:日本電気model:esmpro/serveragentscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center api configuration managerscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage v100scope: - version: -

Trust: 0.8

vendor:日立model:jp1/file transmission server/ftpscope: - version: -

Trust: 0.8

vendor:日本電気model:spoolserver/reportfilingscope: - version: -

Trust: 0.8

vendor:日本電気model:actsecure ポータルscope: - version: -

Trust: 0.8

vendor:日本電気model:iot 共通基盤scope: - version: -

Trust: 0.8

vendor:日本電気model:vranscope: - version: -

Trust: 0.8

vendor:日本電気model:nec multimedia olap for 映像分析サービスscope: - version: -

Trust: 0.8

vendor:日立model:jp1/data highway - server starter editionscope: - version: -

Trust: 0.8

vendor:日立model:jp1/performance managementscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - smart device managerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/operations analyticsscope: - version: -

Trust: 0.8

vendor:日本電気model:nec ai acceleratorscope: - version: -

Trust: 0.8

vendor:opensslmodel:opensslscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage v10escope: - version: -

Trust: 0.8

vendor:日本電気model:ix ルータscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center viewpointscope: - version: -

Trust: 0.8

vendor:日立model:jp1/automatic operationscope: - version: -

Trust: 0.8

vendor:日立model:jp1/snmp system observerscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-003616 // NVD: CVE-2022-4450

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-4450
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-4450
value: HIGH

Trust: 1.0

NVD: CVE-2022-4450
value: HIGH

Trust: 0.8

nvd@nist.gov: CVE-2022-4450
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2022-4450
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-003616 // NVD: CVE-2022-4450 // NVD: CVE-2022-4450

PROBLEMTYPE DATA

problemtype:CWE-415

Trust: 1.0

problemtype:Double release (CWE-415) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-003616 // NVD: CVE-2022-4450

PATCH

title:hitachi-sec-2024-145url:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83

Trust: 0.8

title: - url:https://github.com/waugustus/CarpetFuzz

Trust: 0.1

sources: VULMON: CVE-2022-4450 // JVNDB: JVNDB-2022-003616

EXTERNAL IDS

db:NVDid:CVE-2022-4450

Trust: 3.5

db:JVNid:JVNVU97200253

Trust: 0.8

db:JVNid:JVNVU95962757

Trust: 0.8

db:JVNid:JVNVU95292697

Trust: 0.8

db:JVNid:JVNVU99836374

Trust: 0.8

db:JVNid:JVNVU93250330

Trust: 0.8

db:JVNid:JVNVU91482879

Trust: 0.8

db:JVNid:JVNVU99752892

Trust: 0.8

db:JVNid:JVNVU92598492

Trust: 0.8

db:JVNid:JVNVU99464755

Trust: 0.8

db:JVNid:JVNVU91213144

Trust: 0.8

db:JVNid:JVNVU91198149

Trust: 0.8

db:ICS CERTid:ICSA-23-075-04

Trust: 0.8

db:ICS CERTid:ICSA-23-255-01

Trust: 0.8

db:ICS CERTid:ICSA-25-044-09

Trust: 0.8

db:ICS CERTid:ICSA-24-205-02

Trust: 0.8

db:ICS CERTid:ICSA-23-320-08

Trust: 0.8

db:ICS CERTid:ICSA-23-166-11

Trust: 0.8

db:ICS CERTid:ICSA-24-046-15

Trust: 0.8

db:ICS CERTid:ICSA-24-102-08

Trust: 0.8

db:ICS CERTid:ICSA-24-165-06

Trust: 0.8

db:ICS CERTid:ICSA-25-065-01

Trust: 0.8

db:ICS CERTid:ICSA-24-165-10

Trust: 0.8

db:ICS CERTid:ICSA-24-165-11

Trust: 0.8

db:ICS CERTid:ICSA-23-194-04

Trust: 0.8

db:JVNDBid:JVNDB-2022-003616

Trust: 0.8

db:VULMONid:CVE-2022-4450

Trust: 0.1

db:PACKETSTORMid:174517

Trust: 0.1

db:PACKETSTORMid:172741

Trust: 0.1

db:PACKETSTORMid:171947

Trust: 0.1

db:PACKETSTORMid:171957

Trust: 0.1

db:PACKETSTORMid:172136

Trust: 0.1

db:PACKETSTORMid:172981

Trust: 0.1

db:PACKETSTORMid:172973

Trust: 0.1

db:PACKETSTORMid:173115

Trust: 0.1

sources: VULMON: CVE-2022-4450 // PACKETSTORM: 174517 // PACKETSTORM: 172741 // PACKETSTORM: 171947 // PACKETSTORM: 171957 // PACKETSTORM: 172136 // PACKETSTORM: 172981 // PACKETSTORM: 172973 // PACKETSTORM: 173115 // JVNDB: JVNDB-2022-003616 // NVD: CVE-2022-4450

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2022-4450

Trust: 1.6

url:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83

Trust: 1.0

url:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34cca19c766bbddc31683d0858b

Trust: 1.0

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2023-0003

Trust: 1.0

url:https://www.openssl.org/news/secadv/20230207.txt

Trust: 1.0

url:https://security.gentoo.org/glsa/202402-08

Trust: 1.0

url:https://access.redhat.com/security/team/contact/

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2022-4450

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2022-4304

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2023-0215

Trust: 0.8

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.8

url:https://bugzilla.redhat.com/):

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-4304

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91213144/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99752892/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99464755/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu95292697/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu97200253/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu92598492/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91198149/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99836374/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu93250330/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu95962757/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91482879/index.html

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-04

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-11

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-194-04

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-255-01

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-08

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-046-15

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-102-08

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-06

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-10

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-11

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-205-02

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-09

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-25-065-01

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-0215

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2023-0361

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2023-0361

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2023-0286

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2023-0286

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-36227

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2023-27535

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-36227

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2023-23916

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2023-23916

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2023-24537

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-0767

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-24538

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-24534

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-41723

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-0767

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41723

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-24536

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-29199

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-29017

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-29017

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-30547

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-30547

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-29199

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-25881

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-25881

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41715

Trust: 0.2

url:https://issues.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-2880

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2880

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-41715

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-24540

Trust: 0.2

url:https://github.com/waugustus/carpetfuzz

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-34969

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-38408

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-3899

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-2602

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-32681

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-29469

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-3709

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-28321

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-34969

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-29469

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-27536

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-32681

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-3709

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-28321

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-28484

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-27536

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-28484

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:4982

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-2603

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-2602

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-2603

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-38408

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-21938

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-21967

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.11/html/serverless/index

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.12/html/serverless/index

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-21939

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.13/html/serverless/index

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-41724

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-21930

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-21939

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41724

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-21937

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-21954

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-21938

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-21930

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25173

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3455

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-21968

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-21937

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-41725

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41725

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:1893

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-4415

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-4415

Trust: 0.1

url:https://access.redhat.com/solutions/7007647

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3841

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/release_notes/

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html-single/install/index#installing

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3841

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:1888

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/multicluster_engine/installing-while-connected-online

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:2098

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25858

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-39229

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20329

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43138

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-39229

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3645

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-24999

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-43138

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20329

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25858

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24999

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-27664

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-27664

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42898

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25147

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42898

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3970

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25147

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-29007

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1999

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25652

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2795

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-35737

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-46848

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3624

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2795

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-47629

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3627

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-35737

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-46848

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-22490

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1304

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-2491

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25815

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3627

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-23946

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3970

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-41717

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1304

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41717

Trust: 0.1

url:https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-24329

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.13/updating/updating-cluster-cli.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3614

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-24329

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.13/release_notes/ocp-4-13-release-notes.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3612

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-24540

Trust: 0.1

sources: VULMON: CVE-2022-4450 // PACKETSTORM: 174517 // PACKETSTORM: 172741 // PACKETSTORM: 171947 // PACKETSTORM: 171957 // PACKETSTORM: 172136 // PACKETSTORM: 172981 // PACKETSTORM: 172973 // PACKETSTORM: 173115 // JVNDB: JVNDB-2022-003616 // NVD: CVE-2022-4450

CREDITS

Red Hat

Trust: 0.8

sources: PACKETSTORM: 174517 // PACKETSTORM: 172741 // PACKETSTORM: 171947 // PACKETSTORM: 171957 // PACKETSTORM: 172136 // PACKETSTORM: 172981 // PACKETSTORM: 172973 // PACKETSTORM: 173115

SOURCES

db:VULMONid:CVE-2022-4450
db:PACKETSTORMid:174517
db:PACKETSTORMid:172741
db:PACKETSTORMid:171947
db:PACKETSTORMid:171957
db:PACKETSTORMid:172136
db:PACKETSTORMid:172981
db:PACKETSTORMid:172973
db:PACKETSTORMid:173115
db:JVNDBid:JVNDB-2022-003616
db:NVDid:CVE-2022-4450

LAST UPDATE DATE

2026-01-28T22:51:00.979000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2022-003616date:2025-09-22T02:31:00
db:NVDid:CVE-2022-4450date:2025-11-04T20:16:15.060

SOURCES RELEASE DATE

db:PACKETSTORMid:174517date:2023-09-06T16:39:54
db:PACKETSTORMid:172741date:2023-06-06T16:34:53
db:PACKETSTORMid:171947date:2023-04-20T15:55:06
db:PACKETSTORMid:171957date:2023-04-20T16:14:17
db:PACKETSTORMid:172136date:2023-05-04T14:24:12
db:PACKETSTORMid:172981date:2023-06-16T16:26:18
db:PACKETSTORMid:172973date:2023-06-16T16:21:58
db:PACKETSTORMid:173115date:2023-06-23T15:03:52
db:JVNDBid:JVNDB-2022-003616date:2023-02-28T00:00:00
db:NVDid:CVE-2022-4450date:2023-02-08T20:15:23.973