ID

VAR-202302-0482


CVE

CVE-2022-4304


TITLE

OpenSSL  side-channel vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2022-003736

DESCRIPTION

A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection. (CVE-2022-4304) A use-after-free vulnerability was found in OpenSSL's BIO_new_NDEF function. The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally by OpenSSL to support the SMIME, CMS, and PKCS7 streaming capabilities, but it may also be called directly by end-user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions. For example, if a CMS recipient public key is invalid, the new filter BIO is freed, and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up, and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then calls BIO_pop() on the BIO, a use-after-free will occur, possibly resulting in a crash. (CVE-2023-0215) A type confusion vulnerability was found in OpenSSL when OpenSSL X.400 addresses processing inside an X.509 GeneralName. When CRL checking is enabled (for example, the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an malicious user to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or cause a denial of service. In most cases, the attack requires the malicious user to provide both the certificate chain and CRL, of which neither needs a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. In this case, this vulnerability is likely only to affect applications that have implemented their own functionality for retrieving CRLs over a network. (CVE-2023-0286). Bug Fix(es): * Requested TSC frequency outside tolerance range & TSC scaling not supported (BZ#2151169) * User cannot get resource "virtualmachineinstances/portforward" in API group "subresources.kubevirt.io" (BZ#2160673) * 4.11.4 containers (BZ#2173835) * VMI with x86_Icelake fail when mpx feature is missing (BZ#2218193) 3. Bugs fixed (https://bugzilla.redhat.com/): 2151169 - Requested TSC frequency outside tolerance range & TSC scaling not supported 2160673 - User cannot get resource "virtualmachineinstances/portforward" in API group "subresources.kubevirt.io" 2173835 - 4.11.4 containers 2212085 - CVE-2023-3089 openshift: OCP & FIPS mode 2218193 - VMI with x86_Icelake fail when mpx feature is missing 5. ========================================================================== Ubuntu Security Notice USN-6564-1 January 03, 2024 nodejs vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS Summary: Several security issues were fixed in Node.js. Software Description: - nodejs: An open-source, cross-platform JavaScript runtime environment. Details: Hubert Kario discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to obtain sensitive information. (CVE-2022-4304) CarpetFuzz, Dawei Wang discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2022-4450) Octavio Galland and Marcel Böhme discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-0215) David Benjamin discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to obtain sensitive information. (CVE-2023-0286) Hubert Kario and Dmitry Belyavsky discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-0401) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS: libnode-dev 12.22.9~dfsg-1ubuntu3.3 libnode72 12.22.9~dfsg-1ubuntu3.3 nodejs 12.22.9~dfsg-1ubuntu3.3 In general, a standard system update will make all the necessary changes. Bugs fixed (https://bugzilla.redhat.com/): 2178358 - CVE-2022-41723 net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding 2212085 - CVE-2023-3089 openshift: OCP & FIPS mode 5. JIRA issues fixed (https://issues.redhat.com/): OSSM-4197 - [maistra-2.2] CNI installer fails if /etc/cni/multus/net.d/ doesn't exist OSSM-4222 - Update 2.2 base image OSSM-4289 - Release Kiali container v1.48 for OSSM 2.2 6. Bugs fixed (https://bugzilla.redhat.com/): 2138971 - CVE-2022-3782 keycloak: path traversal via double URL encoding 2155682 - CVE-2022-46364 Apache CXF: SSRF Vulnerability 2162200 - CVE-2022-31690 spring-security-oauth2-client: Privilege Escalation in spring-security-oauth2-client 2170431 - CVE-2022-41966 xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow 5. JIRA issues fixed (https://issues.jboss.org/): MTA-118 - Automated tagging of resources with Windup MTA-123 - MTA crashes cluster nodes when running bulk binary analysis due to requests and limits not being configurable MTA-129 - User field in Manage Import is empty MTA-160 - [Upstream] Maven Repositories "No QueryClient set, use QueryClientProvider to set one" MTA-204 - Every http request made to tagtypes returns HTTP Status 404 MTA-256 - Update application import template MTA-260 - [Regression] Application import through OOTB import template fails MTA-261 - [Regression] UI incorrectly reports target applications have in-progress/complete assessment MTA-263 - [Regression] Discard assessment option present even when assessment is not complete MTA-267 - Analysis EAP targets should include eap8 MTA-268 - RFE: Automated Tagging details to add on Review analysis details page MTA-279 - All types of Source analysis is failing in MTA 6.1.0 MTA-28 - Success Alert is not displayed when subsequent analysis are submitted MTA-282 - Discarding review results in 404 error MTA-283 - Sorting broken on Application inventory page MTA-284 - HTML reports download with no files in reports and stats folders MTA-29 - Asterisk on Description while creating a credentials should be removed MTA-297 - [Custom migration targets] Cannot upload JPG file as an icon MTA-298 - [Custom migration targets] Unclear error when uploading image greater than 1Mb of size MTA-299 - [RFE][Custom migration targets] Assign an icon: Add image max size in the note under the image name MTA-300 - [Custom rules] Cannot upload more than one rules file MTA-303 - [UI][Custom migration targets] The word "Please" should be removed from the error message about existing custom target name MTA-304 - [Custom rules] Failed analysis when retrieving custom rules files from a repository MTA-306 - MTA allows the uploading of multiple binaries for analysis MTA-311 - MTA operator fails to reconcile on a clean (non-upgrade) install MTA-314 - PVCs may not provision if storageClassName is not set. MTA-330 - With auth disabled, 'username' seen in the persona dropdown MTA-332 - Tagging: Few Tags are highlighted with color MTA-34 - Cannot filter by Business Service when copying assessments MTA-345 - [Custom migration targets] Error message "imageID must be defined" is displayed when uploading image MTA-35 - Only the first notification is displayed when discarding multiple copied assessments MTA-350 - Maven Central links from the dependencies tab in reports seem to be broken MTA-351 - AspectJ is not identified as an Open Source Library MTA-356 - The inventory view has to be refreshed for the tags that were assigned by an analysis to appear MTA-363 - [UI][Custom migration targets] "Repository type" field name is missing MTA-364 - [Custom migration targets] Unknown image file when editing a custom migration target MTA-366 - Tagging: For no tags attached "filter by" can be improved MTA-367 - [Custom migration targets] Cannot use a custom migration target in analysis MTA-369 - Custom migration targets: HTML elements are duplicated MTA-375 - Run button does not execute the analysis MTA-377 - [UI][Custom rules] Custom rules screen of the analysis configuration wizard is always marked as required MTA-378 - [UI][Custom rules] Info message on the Custom rules screen is not updated MTA-38 - Only the first notification is displayed when multiple files are imported. MTA-381 - Custom Rules: When try to update Add rules the Error alert is displayed MTA-382 - Custom Rules: Sometimes able to upload duplicate rules files MTA-388 - CSV reports download empty when enabling the option after an analysis MTA-389 - [Custom rules in Analysis] Failed analysis when retrieving custom rules files from a private repository MTA-391 - [Custom rules in Analysis] Targets from uploaded rules file are not removed once the file is removed MTA-392 - Unable to see all custom migration targets when using a vertical monitor MTA-41 - [UI] Failed to refresh token if Keycloak feature "Use Refresh Tokens" is off MTA-412 - Display alert message before reviewing an already reviewed application MTA-428 - [Custom Rules] MTA analysis custom rules conflict message MTA-430 - Analysis wizard: Next button should be enabled only after at least one target is selected MTA-438 - Tagging: Retrieving tags needs a loading indicator MTA-439 - [Regression][Custom rules] Failed to run analysis with custom rules from a repository MTA-443 - Custom rules: Add button can be disabled until duplicate rule file is removed MTA-50 - RFE: Replace the MTA acronym in the title with "Migration Toolkit for Applications" MTA-51 - RFE: " Select the list of packages to be analyzed manually" to modify the title MTA-52 - [RFE] We can change "Not associated artifact" to "No associated artifact" MTA-55 - Can't choose a custom rule via a file explorer(mac OS finder) in Tackle 2.0 MTA-78 - CVE-2022-46364 org.keycloak-keycloak-parent: Apache CXF: SSRF Vulnerability [mta-6.0] MTA-99 - Unable to use root path during checking for maven dependencies 6. Description: Multicluster Engine for Kubernetes 2.1.6 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Jira issue addressed: ACM-3513: MCE 2.1.6 images Security fix(es): * CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability 3. Solution: For multicluster engine for Kubernetes, see the following documentation for details on how to install the images: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/multicluster_engine/multicluster_engine_overview#installing-while-connected-online-mce 4. Bugs fixed (https://bugzilla.redhat.com/): 2165824 - CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability 5. JIRA issues fixed (https://issues.jboss.org/): ACM-3513 - MCE 2.1.6 Images 6. Clusters and applications are all visible and managed from a single console—with security policy built in. Summary: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 2 is now available. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 2 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es): * apr-util: out-of-bounds writes in the apr_base64 (CVE-2022-25147) * expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (CVE-2022-43680) * curl: HSTS bypass via IDN (CVE-2022-43551) * curl: HTTP Proxy deny use-after-free (CVE-2022-43552) * curl: HSTS ignored on multiple requests (CVE-2023-23914) * curl: HSTS amnesia with --parallel (CVE-2023-23915) * curl: HTTP multi-header compression denial of service (CVE-2023-23916) * expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (CVE-2022-43680) * httpd: mod_dav: out-of-bounds read/write of zero byte (CVE-2006-20001) * httpd: HTTP request splitting with mod_rewrite and mod_proxy (CVE-2023-25690) * openssl: timing attack in RSA Decryption implementation (CVE-2022-4304) * openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450) * openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215) * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2140059 - CVE-2022-43680 expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate 2152639 - CVE-2022-43551 curl: HSTS bypass via IDN 2152652 - CVE-2022-43552 curl: Use-after-free triggered by an HTTP proxy deny response 2161774 - CVE-2006-20001 httpd: mod_dav: out-of-bounds read/write of zero byte 2164440 - CVE-2023-0286 openssl: X.400 address type confusion in X.509 GeneralName 2164487 - CVE-2022-4304 openssl: timing attack in RSA Decryption implementation 2164492 - CVE-2023-0215 openssl: use-after-free following BIO_new_NDEF 2164494 - CVE-2022-4450 openssl: double free after calling PEM_read_bio_ex 2167797 - CVE-2023-23914 curl: HSTS ignored on multiple requests 2167813 - CVE-2023-23915 curl: HSTS amnesia with --parallel 2167815 - CVE-2023-23916 curl: HTTP multi-header compression denial of service 2169652 - CVE-2022-25147 apr-util: out-of-bounds writes in the apr_base64 2176209 - CVE-2023-25690 httpd: HTTP request splitting with mod_rewrite and mod_proxy 5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift Container Platform 4.11.43 bug fix and security update Advisory ID: RHSA-2023:3542-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2023:3542 Issue date: 2023-06-14 CVE Names: CVE-2021-38561 CVE-2022-4304 CVE-2022-4450 CVE-2023-0215 CVE-2023-0361 CVE-2023-24540 ===================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.11.43 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.43. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHSA-2023:3541 Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes: https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html Security Fix(es): * golang: out-of-bounds read in golang.org/x/text/language leads to DoS (CVE-2021-38561) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. All OpenShift Container Platform 4.11 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html 3. Solution: For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html You may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags. The sha values for the release are (For x86_64 architecture) The image digest is sha256:d11cd63a623d33bda744f1a886d4b55710db4d68878967be2ebcd5535fafa25d (For s390x architecture) The image digest is sha256:ff0182211e8d73877a69aec8a47c32f8b1e327bd4c9edad51bcffb576f8094dc (For ppc64le architecture) The image digest is sha256:912d94c0fd0a61c85f9f7fea9c815bee35fa0def9c719984a625b9ba1392d403 (For aarch64 architecture) The image digest is sha256:724078d654fb07fc816508b70f548ada9e1241592af19e72757b7ad4d270c045 All OpenShift Container Platform 4.11 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS 5. JIRA issues fixed (https://issues.redhat.com/): OCPBUGS-10719 - machines stuck in provisioned or provisioning OCPBUGS-12750 - [alibabacloud] IPI install got bootstrap failure and without any node ready, due to enforced EIP bandwidth 5 Mbit/s OCPBUGS-13166 - Bump to kubernetes 1.24.14 OCPBUGS-13661 - `cluster-reader` role cannot access "k8s.ovn.org" API Group resources OCPBUGS-13820 - Excessive memory consumption of aws-ebs-csi-driver-node pods (for 4.11) OCPBUGS-13916 - [4.11] container_network* metrics fail to report OCPBUGS-14069 - [4.11] Fast track BZ#2196441 (Network Manager) OCPBUGS-14288 - [4.11] Installer - provisioning interface on master node not getting ipv4 dhcp ip address from bootstrap dhcp server on OCP IPI BareMetal install OCPBUGS-14564 - IPv6 interface and address missing in all pods - OCP 4.12-ec-2 BM IPI 6. References: https://access.redhat.com/security/cve/CVE-2021-38561 https://access.redhat.com/security/cve/CVE-2022-4304 https://access.redhat.com/security/cve/CVE-2022-4450 https://access.redhat.com/security/cve/CVE-2023-0215 https://access.redhat.com/security/cve/CVE-2023-0361 https://access.redhat.com/security/cve/CVE-2023-24540 https://access.redhat.com/security/updates/classification/#moderate https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZIoLmdzjgjWX9erEAQhcAw//ZaBKfQOKMM8l8SrzuJfWAcQn9H191408 2C8ceKDrXIAJU/g+bKMAdIKOFKvQtIWLZeShgR2dxTjROnON/WYISXB/qAtLBC+f GLXB92+K+lCZSKOKUOg3HqYQj5hQUenM8pVz8s2pcmJKNpYwrJKCyB2fhdL0XZkp N0YSUYwUPlbOUkeWlwln2nb/U2Fy2auiOODbkwcZDExF/n1Qf7tLt3NXAIwi87Q5 KpEnT2pI8J6w0xrArEOnd2aq6Ix4/IEglP0OIOSZ5p74bMACVxWuPiBCisea21Fl 98WSfceQffy2SK3cygTFSxRt4GL31B5mcSAX5bFoDFXqZjzSEHhUIOAEAp7OG+oo COMAR6xkiiwmFemjms1ttqbq65k8abj4CLTXd7zbz8qxo13/66nPF21mVaDoanrr uXap4EjXjIKutsO+jwfAi4J236maCH4MPt0QNwhB5qH+4uIxEO5H7HWza2q62kQ8 8cHyfgPrquofuWIFW/bKXsedJFNm7bQy+A0FPABscO1CZme6TsKdBNz3n934BuXb gDSvG59Wu8gd7weM6IxYmQSPjpLR6intAalhvNT5HrKsCVjer8360z75u4J8Mt6D Yd+NZObAYAGiNWRGQCQhHwSNUU6zzHAQYRsyf0dVnSq/PhiN6ILg0XCpi38U4hQb UewDEapQStY= =/4iS -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.43

sources: NVD: CVE-2022-4304 // JVNDB: JVNDB-2022-003736 // VULMON: CVE-2022-4304 // PACKETSTORM: 174629 // PACKETSTORM: 176366 // PACKETSTORM: 173549 // PACKETSTORM: 172054 // PACKETSTORM: 172084 // PACKETSTORM: 172144 // PACKETSTORM: 172731 // PACKETSTORM: 172961

AFFECTED PRODUCTS

vendor:日立model:ucosminexus primary server basescope: - version: -

Trust: 1.6

vendor:日立model:ucosminexus application serverscope: - version: -

Trust: 1.6

vendor:日立model:ucosminexus service platformscope: - version: -

Trust: 1.6

vendor:stormshieldmodel:endpoint securityscope:ltversion:7.2.40

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:3.0.8

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:3.8.0

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:4.3.16

Trust: 1.0

vendor:stormshieldmodel:sslvpnscope:ltversion:3.2.1

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:4.0.0

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:4.4.0

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:2.8.0

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:1.1.1t

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.1.1

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:2.7.11

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:3.11.22

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:4.6.3

Trust: 1.0

vendor:opensslmodel:opensslscope:ltversion:1.0.2zg

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.2

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:3.0.0

Trust: 1.0

vendor:stormshieldmodel:network securityscope:ltversion:3.7.34

Trust: 1.0

vendor:stormshieldmodel:network securityscope:gteversion:2.7.0

Trust: 1.0

vendor:日本電気model:neoface monitorscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage v300scope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus application server-rscope: - version: -

Trust: 0.8

vendor:日立model:jp1/data highway - serverscope: - version: -

Trust: 0.8

vendor:日本電気model:養殖魚サイズ測定自動化サービスscope: - version: -

Trust: 0.8

vendor:日立model:プログラミング環境 for javascope: - version: -

Trust: 0.8

vendor:日立model:jp1/service support starter editionscope: - version: -

Trust: 0.8

vendor:日本電気model:得選街・gcbscope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus developerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/service supportscope: - version: -

Trust: 0.8

vendor:日立model:hitachi configuration managerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/basescope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - operations directorscope: - version: -

Trust: 0.8

vendor:日立model:hitachi compute systems managerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/automatic job management system 3 - definitions assistantscope: - version: -

Trust: 0.8

vendor:日立model:日立アドバンストサーバ ha8000v シリーズscope: - version: -

Trust: 0.8

vendor:日本電気model:connexive application platformscope: - version: -

Trust: 0.8

vendor:日立model:jp1/navigation platform for developersscope: - version: -

Trust: 0.8

vendor:日立model:jp1/automatic job management system 3 - managerscope: - version: -

Trust: 0.8

vendor:日本電気model:webotx application serverscope: - version: -

Trust: 0.8

vendor:日立model:hitachi replication managerscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage t280scope: - version: -

Trust: 0.8

vendor:日立model:ucosminexus service architectscope: - version: -

Trust: 0.8

vendor:日本電気model:nec enhanced speech analysisscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - managerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/navigation platformscope: - version: -

Trust: 0.8

vendor:日立model:cosminexus http serverscope: - version: -

Trust: 0.8

vendor:日本電気model:webotx sip application serverscope: - version: -

Trust: 0.8

vendor:日立model:hitachi global link managerscope: - version: -

Trust: 0.8

vendor:日本電気model:connexive pfscope: - version: -

Trust: 0.8

vendor:日本電気model:esmpro/serveragentscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage v100scope: - version: -

Trust: 0.8

vendor:日立model:jp1/file transmission server/ftpscope: - version: -

Trust: 0.8

vendor:日本電気model:spoolserver/reportfilingscope: - version: -

Trust: 0.8

vendor:日本電気model:actsecure ポータルscope: - version: -

Trust: 0.8

vendor:日本電気model:iot 共通基盤scope: - version: -

Trust: 0.8

vendor:日本電気model:vranscope: - version: -

Trust: 0.8

vendor:日本電気model:nec multimedia olap for 映像分析サービスscope: - version: -

Trust: 0.8

vendor:日立model:jp1/data highway - server starter editionscope: - version: -

Trust: 0.8

vendor:日立model:jp1/performance managementscope: - version: -

Trust: 0.8

vendor:日立model:jp1/it desktop management 2 - smart device managerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/operations analyticsscope: - version: -

Trust: 0.8

vendor:日本電気model:nec ai acceleratorscope: - version: -

Trust: 0.8

vendor:opensslmodel:opensslscope: - version: -

Trust: 0.8

vendor:日本電気model:istorage v10escope: - version: -

Trust: 0.8

vendor:日立model:hitachi tiered storage managerscope: - version: -

Trust: 0.8

vendor:日立model:hitachi device managerscope: - version: -

Trust: 0.8

vendor:日立model:jp1/automatic operationscope: - version: -

Trust: 0.8

vendor:日立model:jp1/snmp system observerscope: - version: -

Trust: 0.8

vendor:日本電気model:ix ルータscope: - version: -

Trust: 0.8

vendor:日立model:hitachi tuning managerscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-003736 // NVD: CVE-2022-4304

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-4304
value: MEDIUM

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2022-4304
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-4304
value: MEDIUM

Trust: 0.8

nvd@nist.gov: CVE-2022-4304
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2022-4304
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-003736 // NVD: CVE-2022-4304 // NVD: CVE-2022-4304

PROBLEMTYPE DATA

problemtype:CWE-203

Trust: 1.0

problemtype:others (CWE-Other) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-003736 // NVD: CVE-2022-4304

THREAT TYPE

remote

Trust: 0.1

sources: PACKETSTORM: 176366

PATCH

title:hitachi-sec-2023-135 Software product security informationurl:https://www.openssl.org/news/secadv/20230207.txt

Trust: 0.8

title:Red Hat: url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2022-4304

Trust: 0.1

title:Amazon Linux AMI: ALAS-2023-1683url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2023-1683

Trust: 0.1

title:Debian Security Advisories: DSA-5343-1 openssl -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=b6a11b827fe9cfaea9c113b2ad37856f

Trust: 0.1

title:Amazon Linux 2: ALAS2-2023-1935url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2023-1935

Trust: 0.1

title:Amazon Linux 2: ALAS2-2023-1934url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2023-1934

Trust: 0.1

title:Palo Alto Networks Security Advisory: PAN-SA-2023-0001 Impact of OpenSSL Vulnerabilities Disclosed Feb 7, 2023url:https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory&qid=3092389eb9f034e4b8387a75a5ae33f8

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2022-4304

Trust: 0.1

sources: VULMON: CVE-2022-4304 // JVNDB: JVNDB-2022-003736

EXTERNAL IDS

db:NVDid:CVE-2022-4304

Trust: 3.5

db:ICS CERTid:ICSA-23-143-02

Trust: 0.8

db:ICS CERTid:ICSA-23-222-09

Trust: 0.8

db:ICS CERTid:ICSA-23-075-04

Trust: 0.8

db:ICS CERTid:ICSA-23-255-01

Trust: 0.8

db:ICS CERTid:ICSA-25-044-09

Trust: 0.8

db:ICS CERTid:ICSA-24-205-02

Trust: 0.8

db:ICS CERTid:ICSA-23-320-08

Trust: 0.8

db:ICS CERTid:ICSA-23-166-11

Trust: 0.8

db:ICS CERTid:ICSA-24-046-15

Trust: 0.8

db:ICS CERTid:ICSA-24-102-08

Trust: 0.8

db:ICS CERTid:ICSA-24-165-06

Trust: 0.8

db:ICS CERTid:ICSA-25-065-01

Trust: 0.8

db:ICS CERTid:ICSA-25-160-02

Trust: 0.8

db:ICS CERTid:ICSA-24-165-10

Trust: 0.8

db:ICS CERTid:ICSA-24-165-11

Trust: 0.8

db:ICS CERTid:ICSA-23-194-04

Trust: 0.8

db:JVNid:JVNVU97200253

Trust: 0.8

db:JVNid:JVNVU95962757

Trust: 0.8

db:JVNid:JVNVU95292697

Trust: 0.8

db:JVNid:JVNVU99836374

Trust: 0.8

db:JVNid:JVNVU93250330

Trust: 0.8

db:JVNid:JVNVU91482879

Trust: 0.8

db:JVNid:JVNVU98345649

Trust: 0.8

db:JVNid:JVNVU98954443

Trust: 0.8

db:JVNid:JVNVU99752892

Trust: 0.8

db:JVNid:JVNVU92598492

Trust: 0.8

db:JVNid:JVNVU90056839

Trust: 0.8

db:JVNid:JVNVU99464755

Trust: 0.8

db:JVNid:JVNVU91213144

Trust: 0.8

db:JVNid:JVNVU91676340

Trust: 0.8

db:JVNid:JVNVU91198149

Trust: 0.8

db:JVNDBid:JVNDB-2022-003736

Trust: 0.8

db:VULMONid:CVE-2022-4304

Trust: 0.1

db:PACKETSTORMid:174629

Trust: 0.1

db:PACKETSTORMid:176366

Trust: 0.1

db:PACKETSTORMid:173549

Trust: 0.1

db:PACKETSTORMid:172054

Trust: 0.1

db:PACKETSTORMid:172084

Trust: 0.1

db:PACKETSTORMid:172144

Trust: 0.1

db:PACKETSTORMid:172731

Trust: 0.1

db:PACKETSTORMid:172961

Trust: 0.1

sources: VULMON: CVE-2022-4304 // PACKETSTORM: 174629 // PACKETSTORM: 176366 // PACKETSTORM: 173549 // PACKETSTORM: 172054 // PACKETSTORM: 172084 // PACKETSTORM: 172144 // PACKETSTORM: 172731 // PACKETSTORM: 172961 // JVNDB: JVNDB-2022-003736 // NVD: CVE-2022-4304

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2022-4304

Trust: 1.5

url:https://www.openssl.org/news/secadv/20230207.txt

Trust: 1.1

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2023-0003

Trust: 1.0

url:https://security.gentoo.org/glsa/202402-08

Trust: 1.0

url:https://access.redhat.com/security/cve/cve-2022-4304

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91213144/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99752892/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91676340/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99464755/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu95292697/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu90056839/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu97200253/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu92598492/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu98954443/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91198149/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99836374/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu93250330/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu95962757/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91482879/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu98345649/index.html

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-04

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-02

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-11

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-194-04

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-222-09

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-255-01

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-08

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-046-15

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-102-08

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-06

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-10

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-11

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-205-02

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-09

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-25-065-01

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-25-160-02

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2022-4450

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2023-0215

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-4450

Trust: 0.7

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.7

url:https://access.redhat.com/security/team/contact/

Trust: 0.7

url:https://bugzilla.redhat.com/):

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2023-0361

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2023-0215

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2023-0286

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2023-0361

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2023-0286

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2023-23916

Trust: 0.4

url:https://issues.jboss.org/):

Trust: 0.3

url:https://access.redhat.com/security/vulnerabilities/rhsb-2023-001

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-3089

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-3089

Trust: 0.2

url:https://issues.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-0767

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-48303

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-10735

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2023-23916

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-40897

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-4415

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-25881

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-28861

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-40897

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-45061

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-28861

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-4415

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-10735

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-45061

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-48303

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-25881

Trust: 0.2

url:https://github.com/live-hack-cve/cve-2022-4304

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://alas.aws.amazon.com/alas-2023-1683.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-3709

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-38408

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-3899

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-38408

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-2828

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:5103

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-2828

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-3709

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-3899

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0401

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6564-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/nodejs/12.22.9~dfsg-1ubuntu3.3

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-26604

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:4112

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-1667

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-2283

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-24329

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24736

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41723

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-2283

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1667

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24736

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-26604

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-41723

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-24329

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3782

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2880

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30631

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-32190

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-32148

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32189

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4235

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-27664

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1705

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32190

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32148

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2995

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2880

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-31690

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2879

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:2041

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3466

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3172

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-32189

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3172

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4235

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3259

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-27664

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41966

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3162

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2879

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-46364

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3162

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3259

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-31690

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-30631

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2995

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41715

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1705

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/multicluster_engine/multicluster_engine_overview#installing-while-connected-online-mce

Trust: 0.1

url:https://access.redhat.com/security/updates/classification#moderate

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-0767

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:2061

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-43945

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-0266

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-4269

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-4269

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2873

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:2104

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41222

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-4378

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-41222

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-0386

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2873

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-43945

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-4378

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25147

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-23915

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25690

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-43552

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-43552

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-43680

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-43680

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-23914

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3355

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-25690

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-23914

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-20001

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25147

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-23915

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-43551

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2006-20001

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-43551

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html

Trust: 0.1

url:https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-24540

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-38561

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-24540

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3541

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3542

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-38561

Trust: 0.1

sources: VULMON: CVE-2022-4304 // PACKETSTORM: 174629 // PACKETSTORM: 176366 // PACKETSTORM: 173549 // PACKETSTORM: 172054 // PACKETSTORM: 172084 // PACKETSTORM: 172144 // PACKETSTORM: 172731 // PACKETSTORM: 172961 // JVNDB: JVNDB-2022-003736 // NVD: CVE-2022-4304

CREDITS

Red Hat

Trust: 0.7

sources: PACKETSTORM: 174629 // PACKETSTORM: 173549 // PACKETSTORM: 172054 // PACKETSTORM: 172084 // PACKETSTORM: 172144 // PACKETSTORM: 172731 // PACKETSTORM: 172961

SOURCES

db:VULMONid:CVE-2022-4304
db:PACKETSTORMid:174629
db:PACKETSTORMid:176366
db:PACKETSTORMid:173549
db:PACKETSTORMid:172054
db:PACKETSTORMid:172084
db:PACKETSTORMid:172144
db:PACKETSTORMid:172731
db:PACKETSTORMid:172961
db:JVNDBid:JVNDB-2022-003736
db:NVDid:CVE-2022-4304

LAST UPDATE DATE

2025-12-19T20:52:41.589000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-4304date:2023-02-09T00:00:00
db:JVNDBid:JVNDB-2022-003736date:2025-09-22T02:26:00
db:NVDid:CVE-2022-4304date:2025-11-04T20:16:14.897

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-4304date:2023-02-08T00:00:00
db:PACKETSTORMid:174629date:2023-09-12T16:19:34
db:PACKETSTORMid:176366date:2024-01-03T14:50:24
db:PACKETSTORMid:173549date:2023-07-18T13:36:26
db:PACKETSTORMid:172054date:2023-04-27T18:56:06
db:PACKETSTORMid:172084date:2023-05-02T15:33:51
db:PACKETSTORMid:172144date:2023-05-04T14:40:25
db:PACKETSTORMid:172731date:2023-06-06T16:29:30
db:PACKETSTORMid:172961date:2023-06-16T15:54:13
db:JVNDBid:JVNDB-2022-003736date:2023-03-07T00:00:00
db:NVDid:CVE-2022-4304date:2023-02-08T20:15:23.887