Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-1473
HistoryMay 03, 2022 - 12:00 a.m.

CVE-2022-1473

2022-05-0300:00:00
ubuntu.com
ubuntu.com
23

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.003 Low

EPSS

Percentile

68.7%

The OPENSSL_LH_flush() function, which empties a hash table, contains a bug
that breaks reuse of the memory occuppied by the removed hash table
entries. This function is used when decoding certificates or keys. If a
long lived process periodically decodes certificates or keys its memory
usage will expand without bounds and the process might be terminated by the
operating system causing a denial of service. Also traversing the empty
hash table entries will take increasingly more time. Typically such long
lived processes might be TLS clients or TLS servers configured to accept
client certificate authentication. The function was added in the OpenSSL
3.0 version thus older releases are not affected by the issue. Fixed in
OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).

Notes

Author Note
mdeslaur OpenSSL v3.x only
OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchedk2<Β anyUNKNOWN
ubuntu22.04noarchopenssl<Β 3.0.2-0ubuntu1.1UNKNOWN
ubuntu22.10noarchopenssl<Β 3.0.2-0ubuntu2UNKNOWN
ubuntu23.04noarchopenssl<Β 3.0.2-0ubuntu2UNKNOWN
ubuntu23.10noarchopenssl<Β 3.0.2-0ubuntu2UNKNOWN
ubuntu14.04noarchopenssl<Β anyUNKNOWN
ubuntu16.04noarchopenssl<Β 1.0.2g-1ubuntu4.20+esm3) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.003 Low

EPSS

Percentile

68.7%