ID

VAR-202302-0195


CVE

CVE-2022-4450


TITLE

OpenSSL  Double release vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-003616

DESCRIPTION

The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue. OpenSSL has payload data 0 become a part-time worker PEM When creating a file, PEM_read_bio_ex() A double free vulnerability exists because when returns a failure code, it introduces a pointer to an already freed buffer into the header argument.Malicious by attacker PEM Denial of service by providing files ( crash ) It may be in a state. ========================================================================== Ubuntu Security Notice USN-6564-1 January 03, 2024 nodejs vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS Summary: Several security issues were fixed in Node.js. Software Description: - nodejs: An open-source, cross-platform JavaScript runtime environment. Details: Hubert Kario discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to obtain sensitive information. (CVE-2022-4304) CarpetFuzz, Dawei Wang discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2022-4450) Octavio Galland and Marcel Böhme discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-0215) David Benjamin discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to obtain sensitive information. (CVE-2023-0286) Hubert Kario and Dmitry Belyavsky discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-0401) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: libnode-dev 12.22.9~dfsg-1ubuntu3.3 libnode72 12.22.9~dfsg-1ubuntu3.3 nodejs 12.22.9~dfsg-1ubuntu3.3 In general, a standard system update will make all the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202402-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: OpenSSL: Multiple Vulnerabilities Date: February 04, 2024 Bugs: #876787, #893446, #902779, #903545, #907413, #910556, #911560 ID: 202402-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in OpenSSL, the worst of which could result in denial of service. Affected packages ================= Package Vulnerable Unaffected ---------------- ------------ ------------ dev-libs/openssl < 3.0.10 >= 3.0.10 Description =========== Multiple vulnerabilities have been discovered in OpenSSL. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All OpenSSL users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-3.0.10" References ========== [ 1 ] CVE-2022-3358 https://nvd.nist.gov/vuln/detail/CVE-2022-3358 [ 2 ] CVE-2022-4203 https://nvd.nist.gov/vuln/detail/CVE-2022-4203 [ 3 ] CVE-2022-4304 https://nvd.nist.gov/vuln/detail/CVE-2022-4304 [ 4 ] CVE-2022-4450 https://nvd.nist.gov/vuln/detail/CVE-2022-4450 [ 5 ] CVE-2023-0215 https://nvd.nist.gov/vuln/detail/CVE-2023-0215 [ 6 ] CVE-2023-0216 https://nvd.nist.gov/vuln/detail/CVE-2023-0216 [ 7 ] CVE-2023-0217 https://nvd.nist.gov/vuln/detail/CVE-2023-0217 [ 8 ] CVE-2023-0286 https://nvd.nist.gov/vuln/detail/CVE-2023-0286 [ 9 ] CVE-2023-0401 https://nvd.nist.gov/vuln/detail/CVE-2023-0401 [ 10 ] CVE-2023-0464 https://nvd.nist.gov/vuln/detail/CVE-2023-0464 [ 11 ] CVE-2023-0465 https://nvd.nist.gov/vuln/detail/CVE-2023-0465 [ 12 ] CVE-2023-0466 https://nvd.nist.gov/vuln/detail/CVE-2023-0466 [ 13 ] CVE-2023-2650 https://nvd.nist.gov/vuln/detail/CVE-2023-2650 [ 14 ] CVE-2023-2975 https://nvd.nist.gov/vuln/detail/CVE-2023-2975 [ 15 ] CVE-2023-3446 https://nvd.nist.gov/vuln/detail/CVE-2023-3446 [ 16 ] CVE-2023-3817 https://nvd.nist.gov/vuln/detail/CVE-2023-3817 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202402-08 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2024 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . Description: Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Bugs fixed (https://bugzilla.redhat.com/): 2212085 - CVE-2023-3089 openshift: OCP & FIPS mode 5. JIRA issues fixed (https://issues.redhat.com/): OSSM-3936 - [kiali] do not hardcode label names OSSM-4220 - Update 2.4 base image OSSM-4291 - Release Kiali container v1.65 for OSSM 2.4 6. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Summary: Red Hat Advanced Cluster Management for Kubernetes 2.7.3 General Availability release images, which fix bugs and security updates container images. Description: Red Hat Advanced Cluster Management for Kubernetes 2.7.3 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/release_notes/ Security fix(es) * CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability * CVE-2022-3841 RHACM: unauthenticated SSRF in console API endpoint * CVE-2023-29017 vm2: Sandbox Escape * CVE-2023-29199 vm2: Sandbox Escape * CVE-2023-30547 vm2: Sandbox Escape when exception sanitization 3. Bugs fixed (https://bugzilla.redhat.com/): 2139426 - CVE-2022-3841 RHACM: unauthenticated SSRF in console API endpoint 2165824 - CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability 2185374 - CVE-2023-29017 vm2: sandbox escape 2187409 - CVE-2023-29199 vm2: Sandbox Escape 2187608 - CVE-2023-30547 vm2: Sandbox Escape when exception sanitization 5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: edk2 security, bug fix, and enhancement update Advisory ID: RHSA-2023:2165-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:2165 Issue date: 2023-05-09 CVE Names: CVE-2021-38578 CVE-2022-4304 CVE-2022-4450 CVE-2023-0215 CVE-2023-0286 ==================================================================== 1. Summary: An update for edk2 is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 9) - noarch Red Hat Enterprise Linux CRB (v. 9) - aarch64, noarch, x86_64 3. Description: EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Security Fix(es): * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) * edk2: integer underflow in SmmEntryPoint function leads to potential SMM privilege escalation (CVE-2021-38578) * openssl: timing attack in RSA Decryption implementation (CVE-2022-4304) * openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450) * openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1960321 - CVE-2021-38578 edk2: integer underflow in SmmEntryPoint function leads to potential SMM privilege escalation 1983086 - Assertion failure when creating 1024 VCPU VM: [...]UefiCpuPkg/CpuMpPei/CpuBist.c(186): !EFI_ERROR (Status) 2125336 - Please add edk2-aarch64 and edk2-tools to CRB in RHEL 9 2132951 - edk2: Sort traditional virtualization builds before Confidential Computing builds 2157656 - [edk2] [aarch64] Unable to initialize EFI firmware when using edk2-aarch64-20221207gitfff6d81270b5-1.el9 in some hardwares 2162307 - Broken GRUB output on a serial console 2164440 - CVE-2023-0286 openssl: X.400 address type confusion in X.509 GeneralName 2164487 - CVE-2022-4304 openssl: timing attack in RSA Decryption implementation 2164492 - CVE-2023-0215 openssl: use-after-free following BIO_new_NDEF 2164494 - CVE-2022-4450 openssl: double free after calling PEM_read_bio_ex 2168046 - [edk2] BIOS Release Date string is unexpected length 2174605 - [EDK2] disable dynamic mmio window 6. Package List: Red Hat Enterprise Linux AppStream (v. 9): Source: edk2-20221207gitfff6d81270b5-9.el9_2.src.rpm noarch: edk2-aarch64-20221207gitfff6d81270b5-9.el9_2.noarch.rpm edk2-ovmf-20221207gitfff6d81270b5-9.el9_2.noarch.rpm Red Hat Enterprise Linux CRB (v. 9): aarch64: edk2-debugsource-20221207gitfff6d81270b5-9.el9_2.aarch64.rpm edk2-tools-20221207gitfff6d81270b5-9.el9_2.aarch64.rpm edk2-tools-debuginfo-20221207gitfff6d81270b5-9.el9_2.aarch64.rpm noarch: edk2-aarch64-20221207gitfff6d81270b5-9.el9_2.noarch.rpm edk2-ovmf-20221207gitfff6d81270b5-9.el9_2.noarch.rpm edk2-tools-doc-20221207gitfff6d81270b5-9.el9_2.noarch.rpm x86_64: edk2-debugsource-20221207gitfff6d81270b5-9.el9_2.x86_64.rpm edk2-tools-20221207gitfff6d81270b5-9.el9_2.x86_64.rpm edk2-tools-debuginfo-20221207gitfff6d81270b5-9.el9_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-38578 https://access.redhat.com/security/cve/CVE-2022-4304 https://access.redhat.com/security/cve/CVE-2022-4450 https://access.redhat.com/security/cve/CVE-2023-0215 https://access.redhat.com/security/cve/CVE-2023-0286 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZFo0RNzjgjWX9erEAQg9NA/8DpTlXLXGvC02Zy7lUzgIfqQ3jT1yOsyS o8gP4PqZ2o2MthNJRM3WUq/oxobk4TMvDBTYaOTMF0N5gE7sFAM1gr8Jys4DknWn 8NrruJ0ZvOF/5tzUC5KUqzu322o1oMGW/W4gmH8/DcPZLwrQjdWpuSVvIKaadnzw Ot9T6MHdalN0PaBnxVpu53G9gRLfQwRbXLu8FHBSlYxmiMjfPi2ki4Rg4FqKQrZ0 BkfbZK17JmWxsYsI33e9d6DcRpPN8AxQrBN+rXv0WtzJClbQHi7qR9r5HAiTUIW6 kChuaJXE79uglhAxtZllRWvPV2SfA5LDq75TUiHAC5rUoWBUqMi+hzpPhjNsGDz/ QP7cTjpcs16cJlC7BGnN0NUEQr5fdYVOetJjJBv5wgCJGClmiDucrK9F/gNJIF+6 SIiNQd+dje1dbbD//GxAot/WEiCrsxn2A5sGaWEyapeB8QJ6Js3is6EmpNc10LOt uSoko0yLttx7UJVzjkUTcH7PxpxaplBStcIAJi8Wj77nsAnrpiQORtNAGB0J+4rU pCb1XQlVSlgMlVfU+9jELIpvI8u7kkO1ss3sOaIvxTRycdXGgDXpX+IWQgNO732A 4/R1FmdQNCKLm3XR03ukaYCFHMKLn3s2OqgZiAxWlO1+4VuGxyFd9bvwXCXoKuoa ZqW1JXNcdH8=Ml6L -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Security fix(es): * CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability 3. Solution: For multicluster engine for Kubernetes, see the following documentation for details on how to install the images: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/multicluster_engine/installing-while-connected-online 4

Trust: 2.34

sources: NVD: CVE-2022-4450 // JVNDB: JVNDB-2022-003616 // PACKETSTORM: 176366 // PACKETSTORM: 176985 // PACKETSTORM: 173553 // PACKETSTORM: 173547 // PACKETSTORM: 172678 // PACKETSTORM: 171957 // PACKETSTORM: 172238 // PACKETSTORM: 172136

AFFECTED PRODUCTS

vendor:日立model:ucosminexus primary server basescope: - version: -

Trust: 1.6

vendor:日立model:ucosminexus application serverscope: - version: -

Trust: 1.6

vendor:日立model:ucosminexus service platformscope: - version: -

Trust: 1.6

vendor:stormshieldmodel:network securityscope:ltversion:4.6.3

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.1.1

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:4.0.0

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:3.0.0

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:3.0.8

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:1.1.1t

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:4.3.16

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:4.4.0

Trust: 1.0

vendor:日本電気model:neoface monitorscope: - version: -

Trust: 0.8

vendor:日立model:jp1/automatic operationscope: - version: -

Trust: 0.8

vendor:日立model:jp1/automatic job management system 3 - managerscope: - version: -

Trust: 0.8

vendor:日本電気model:vranscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage v100scope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center analyzer viewpointscope: - version: -

Trust: 0.8

vendor:日立model:cosminexus http serverscope: - version: -

Trust: 0.8

vendor:日立model:jp1/data highway - server starter editionscope: - version: -

Trust: 0.8

vendor:日本電気model:養殖魚サイズ測定自動化サービスscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center api configuration managerscope: - version: -

Trust: 0.8

vendor:日立model:プログラミング環境 for javascope: - version: -

Trust: 0.8

vendor:日立model:jp1/performance managementscope: - version: -

Trust: 0.8

vendor:日立model:hitachi automation directorscope: - version: -

Trust: 0.8

vendor:日本電気model:nec enhanced speech analysisscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage v10escope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center analyzerscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage t280scope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center automatorscope: - version: -

Trust: 0.8

vendor:日本電気model:iot 共通基盤scope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center administratorscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center common servicesscope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus developerscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage v300scope: - version: -

Trust: 0.8

vendor:日立model:jp1/navigation platform for developersscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - operations directorscope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus service architectscope: - version: -

Trust: 0.8

vendor:日本電気model:connexive pfscope: - version: -

Trust: 0.8

vendor:日立model:jp1/operations analyticsscope: - version: -

Trust: 0.8

vendor:日立model:jp1/snmp system observerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - smart device managerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/basescope: - version: -

Trust: 0.8

vendor:日立model:hitachi configuration managerscope: - version: -

Trust: 0.8

vendor:日本電気model:ix ルータscope: - version: -

Trust: 0.8

vendor:opensslmodel:opensslscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - managerscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center viewpointscope: - version: -

Trust: 0.8

vendor:日立model:jp1/file transmission server/ftpscope: - version: -

Trust: 0.8

vendor:日立model:jp1/data highway - serverscope: - version: -

Trust: 0.8

vendor:日立model:jp1/navigation platformscope: - version: -

Trust: 0.8

vendor:日立model:jp1/automatic job management system 3 - definitions assistantscope: - version: -

Trust: 0.8

vendor:日立model:jp1/service support starter editionscope: - version: -

Trust: 0.8

vendor:日立model:jp1/service supportscope: - version: -

Trust: 0.8

vendor:日本電気model:nec multimedia olap for 映像分析サービスscope: - version: -

Trust: 0.8

vendor:日本電気model:connexive application platformscope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus application server-rscope: - version: -

Trust: 0.8

vendor:日本電気model:spoolserver/reportfilingscope: - version: -

Trust: 0.8

vendor:日本電気model:esmpro/serveragentscope: - version: -

Trust: 0.8

vendor:日本電気model:nec ai acceleratorscope: - version: -

Trust: 0.8

vendor:日本電気model:得選街・gcbscope: - version: -

Trust: 0.8

vendor:日本電気model:webotx application serverscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-003616 // NVD: CVE-2022-4450

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-4450
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-4450
value: HIGH

Trust: 1.0

NVD: CVE-2022-4450
value: HIGH

Trust: 0.8

nvd@nist.gov: CVE-2022-4450
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2022-4450
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-003616 // NVD: CVE-2022-4450 // NVD: CVE-2022-4450

PROBLEMTYPE DATA

problemtype:CWE-415

Trust: 1.0

problemtype:Double release (CWE-415) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-003616 // NVD: CVE-2022-4450

THREAT TYPE

remote

Trust: 0.1

sources: PACKETSTORM: 176366

PATCH

title:hitachi-sec-2024-145url:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83

Trust: 0.8

title: - url:https://github.com/waugustus/CarpetFuzz

Trust: 0.1

sources: VULMON: CVE-2022-4450 // JVNDB: JVNDB-2022-003616

EXTERNAL IDS

db:NVDid:CVE-2022-4450

Trust: 3.5

db:ICS CERTid:ICSA-24-165-11

Trust: 0.8

db:ICS CERTid:ICSA-24-102-08

Trust: 0.8

db:ICS CERTid:ICSA-24-165-10

Trust: 0.8

db:ICS CERTid:ICSA-23-255-01

Trust: 0.8

db:ICS CERTid:ICSA-23-075-04

Trust: 0.8

db:ICS CERTid:ICSA-23-320-08

Trust: 0.8

db:ICS CERTid:ICSA-25-044-09

Trust: 0.8

db:ICS CERTid:ICSA-23-166-11

Trust: 0.8

db:ICS CERTid:ICSA-24-046-15

Trust: 0.8

db:ICS CERTid:ICSA-23-194-04

Trust: 0.8

db:ICS CERTid:ICSA-25-065-01

Trust: 0.8

db:ICS CERTid:ICSA-24-205-02

Trust: 0.8

db:ICS CERTid:ICSA-24-165-06

Trust: 0.8

db:JVNid:JVNVU99464755

Trust: 0.8

db:JVNid:JVNVU99836374

Trust: 0.8

db:JVNid:JVNVU95962757

Trust: 0.8

db:JVNid:JVNVU95292697

Trust: 0.8

db:JVNid:JVNVU93250330

Trust: 0.8

db:JVNid:JVNVU92598492

Trust: 0.8

db:JVNid:JVNVU91213144

Trust: 0.8

db:JVNid:JVNVU91482879

Trust: 0.8

db:JVNid:JVNVU99752892

Trust: 0.8

db:JVNid:JVNVU91198149

Trust: 0.8

db:JVNid:JVNVU97200253

Trust: 0.8

db:JVNDBid:JVNDB-2022-003616

Trust: 0.8

db:VULMONid:CVE-2022-4450

Trust: 0.1

db:PACKETSTORMid:176366

Trust: 0.1

db:PACKETSTORMid:176985

Trust: 0.1

db:PACKETSTORMid:173553

Trust: 0.1

db:PACKETSTORMid:173547

Trust: 0.1

db:PACKETSTORMid:172678

Trust: 0.1

db:PACKETSTORMid:171957

Trust: 0.1

db:PACKETSTORMid:172238

Trust: 0.1

db:PACKETSTORMid:172136

Trust: 0.1

sources: VULMON: CVE-2022-4450 // PACKETSTORM: 176366 // PACKETSTORM: 176985 // PACKETSTORM: 173553 // PACKETSTORM: 173547 // PACKETSTORM: 172678 // PACKETSTORM: 171957 // PACKETSTORM: 172238 // PACKETSTORM: 172136 // JVNDB: JVNDB-2022-003616 // NVD: CVE-2022-4450

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2022-4450

Trust: 1.6

url:https://security.gentoo.org/glsa/202402-08

Trust: 1.1

url:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34cca19c766bbddc31683d0858b

Trust: 1.0

url:https://www.openssl.org/news/secadv/20230207.txt

Trust: 1.0

url:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2023-0215

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-4304

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91213144/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99752892/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99464755/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu95292697/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu97200253/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu92598492/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91198149/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99836374/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu93250330/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu95962757/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91482879/index.html

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-04

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-11

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-194-04

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-255-01

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-08

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-046-15

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-102-08

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-06

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-10

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-11

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-205-02

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-09

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-25-065-01

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2023-0215

Trust: 0.6

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-4450

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-4304

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2023-0286

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2023-0361

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2023-0361

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2023-0286

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2023-0401

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-26604

Trust: 0.2

url:https://access.redhat.com/security/vulnerabilities/rhsb-2023-001

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-1667

Trust: 0.2

url:https://issues.redhat.com/):

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-2283

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-24329

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-24736

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-3089

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-2283

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-1667

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24736

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-3089

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-26604

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-24329

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-23916

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-23916

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-25881

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-25881

Trust: 0.2

url:https://github.com/waugustus/carpetfuzz

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6564-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/nodejs/12.22.9~dfsg-1ubuntu3.3

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0466

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0464

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0216

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3358

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0217

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-3817

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-4203

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-3446

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-2975

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0465

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-2650

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41723

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-41723

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:4113

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:4114

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3408

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3841

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/release_notes/

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html-single/install/index#installing

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3841

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-29199

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-29017

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-29017

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-30547

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-30547

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-29199

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:1888

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-38578

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-38578

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:2165

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/multicluster_engine/installing-while-connected-online

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-0767

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0767

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:2098

Trust: 0.1

sources: VULMON: CVE-2022-4450 // PACKETSTORM: 176366 // PACKETSTORM: 176985 // PACKETSTORM: 173553 // PACKETSTORM: 173547 // PACKETSTORM: 172678 // PACKETSTORM: 171957 // PACKETSTORM: 172238 // PACKETSTORM: 172136 // JVNDB: JVNDB-2022-003616 // NVD: CVE-2022-4450

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 173553 // PACKETSTORM: 173547 // PACKETSTORM: 172678 // PACKETSTORM: 171957 // PACKETSTORM: 172238 // PACKETSTORM: 172136

SOURCES

db:VULMONid:CVE-2022-4450
db:PACKETSTORMid:176366
db:PACKETSTORMid:176985
db:PACKETSTORMid:173553
db:PACKETSTORMid:173547
db:PACKETSTORMid:172678
db:PACKETSTORMid:171957
db:PACKETSTORMid:172238
db:PACKETSTORMid:172136
db:JVNDBid:JVNDB-2022-003616
db:NVDid:CVE-2022-4450

LAST UPDATE DATE

2025-06-28T20:05:26.239000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2022-003616date:2025-03-10T03:26:00
db:NVDid:CVE-2022-4450date:2025-05-05T16:15:22.940

SOURCES RELEASE DATE

db:PACKETSTORMid:176366date:2024-01-03T14:50:24
db:PACKETSTORMid:176985date:2024-02-05T15:20:51
db:PACKETSTORMid:173553date:2023-07-18T13:39:27
db:PACKETSTORMid:173547date:2023-07-18T13:35:08
db:PACKETSTORMid:172678date:2023-06-01T14:43:05
db:PACKETSTORMid:171957date:2023-04-20T16:14:17
db:PACKETSTORMid:172238date:2023-05-09T15:23:44
db:PACKETSTORMid:172136date:2023-05-04T14:24:12
db:JVNDBid:JVNDB-2022-003616date:2023-02-28T00:00:00
db:NVDid:CVE-2022-4450date:2023-02-08T20:15:23.973