{"id":"ALPINE-CVE-2022-4450","details":"The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and\ndecodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data.\nIf the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are\npopulated with pointers to buffers containing the relevant decoded data. The\ncaller is responsible for freeing those buffers. It is possible to construct a\nPEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex()\nwill return a failure code but will populate the header argument with a pointer\nto a buffer that has already been freed. If the caller also frees this buffer\nthen a double free will occur. This will most likely lead to a crash. This\ncould be exploited by an attacker who has the ability to supply malicious PEM\nfiles for parsing to achieve a denial of service attack.\n\nThe functions PEM_read_bio() and PEM_read() are simple wrappers around\nPEM_read_bio_ex() and therefore these functions are also directly affected.\n\nThese functions are also called indirectly by a number of other OpenSSL\nfunctions including PEM_X509_INFO_read_bio_ex() and\nSSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal\nuses of these functions are not vulnerable because the caller does not free the\nheader argument if PEM_read_bio_ex() returns a failure code. These locations\ninclude the PEM_read_bio_TYPE() functions as well as the decoders introduced in\nOpenSSL 3.0.\n\nThe OpenSSL asn1parse command line application is also impacted by this issue.","modified":"2025-12-03T22:50:58.174496Z","published":"2023-02-08T20:15:23.973Z","upstream":["CVE-2022-4450"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2022-4450"}],"affected":[{"package":{"name":"openssl","ecosystem":"Alpine:v3.14","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.1t-r0"}]}],"versions":["1.1.1-r1","1.1.1-r2","1.1.1-r3","1.1.1-r4","1.1.1-r5","1.1.1a-r0","1.1.1a-r1","1.1.1b-r0","1.1.1b-r1","1.1.1c-r0","1.1.1c-r1","1.1.1d-r1","1.1.1d-r2","1.1.1d-r3","1.1.1d-r4","1.1.1d-r5","1.1.1e-r0","1.1.1f-r0","1.1.1g-r0","1.1.1h-r0","1.1.1i-r0","1.1.1j-r0","1.1.1k-r0","1.1.1l-r0","1.1.1n-r0","1.1.1o-r0","1.1.1p-r0","1.1.1q-r0","1.1.1s-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-4450.json"}},{"package":{"name":"openssl","ecosystem":"Alpine:v3.15","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.1t-r0"}]}],"versions":["1.1.1l-r2","1.1.1l-r3","1.1.1l-r4","1.1.1l-r5","1.1.1l-r6","1.1.1l-r7","1.1.1l-r8","1.1.1n-r0","1.1.1o-r0","1.1.1p-r0","1.1.1q-r0","1.1.1s-r0","1.1.1s-r1"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-4450.json"}},{"package":{"name":"openssl","ecosystem":"Alpine:v3.16","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.1t-r0"}]}],"versions":["1.1.1l-r2","1.1.1l-r3","1.1.1l-r4","1.1.1l-r5","1.1.1l-r6","1.1.1l-r7","1.1.1m-r0","1.1.1m-r1","1.1.1m-r2","1.1.1m-r3","1.1.1n-r0","1.1.1o-r0","1.1.1p-r0","1.1.1q-r0","1.1.1s-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-4450.json"}},{"package":{"name":"openssl","ecosystem":"Alpine:v3.17","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.8-r0"}]}],"versions":["1.1.1-r0","1.1.1-r1","1.1.1-r2","1.1.1-r3","1.1.1-r4","1.1.1-r5","1.1.1a-r0","1.1.1a-r1","1.1.1b-r0","1.1.1b-r1","1.1.1c-r0","1.1.1c-r1","1.1.1d-r1","1.1.1d-r2","1.1.1d-r3","1.1.1d-r4","1.1.1d-r5","1.1.1e-r0","1.1.1f-r0","1.1.1g-r0","1.1.1h-r0","1.1.1i-r0","1.1.1j-r0","1.1.1k-r0","1.1.1k-r1","1.1.1l-r0","3.0.0-r0","3.0.0-r1","3.0.0-r2","3.0.0-r3","3.0.0-r4","3.0.1-r0","3.0.1-r1","3.0.2-r0","3.0.3-r0","3.0.5-r0","3.0.5-r1","3.0.5-r2","3.0.5-r3","3.0.6-r0","3.0.7-r0","3.0.7-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-4450.json"}},{"package":{"name":"openssl","ecosystem":"Alpine:v3.18","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.8-r0"}]}],"versions":["1.1.1-r0","1.1.1-r1","1.1.1-r2","1.1.1-r3","1.1.1-r4","1.1.1-r5","1.1.1a-r0","1.1.1a-r1","1.1.1b-r0","1.1.1b-r1","1.1.1c-r0","1.1.1c-r1","1.1.1d-r1","1.1.1d-r2","1.1.1d-r3","1.1.1d-r4","1.1.1d-r5","1.1.1e-r0","1.1.1f-r0","1.1.1g-r0","1.1.1h-r0","1.1.1i-r0","1.1.1j-r0","1.1.1k-r0","1.1.1k-r1","1.1.1l-r0","3.0.0-r0","3.0.0-r1","3.0.0-r2","3.0.0-r3","3.0.0-r4","3.0.1-r0","3.0.1-r1","3.0.2-r0","3.0.3-r0","3.0.5-r0","3.0.5-r1","3.0.5-r2","3.0.5-r3","3.0.6-r0","3.0.7-r0","3.0.7-r1","3.0.7-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-4450.json"}},{"package":{"name":"openssl","ecosystem":"Alpine:v3.19","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.8-r0"}]}],"versions":["1.1.1-r0","1.1.1-r1","1.1.1-r2","1.1.1-r3","1.1.1-r4","1.1.1-r5","1.1.1a-r0","1.1.1a-r1","1.1.1b-r0","1.1.1b-r1","1.1.1c-r0","1.1.1c-r1","1.1.1d-r1","1.1.1d-r2","1.1.1d-r3","1.1.1d-r4","1.1.1d-r5","1.1.1e-r0","1.1.1f-r0","1.1.1g-r0","1.1.1h-r0","1.1.1i-r0","1.1.1j-r0","1.1.1k-r0","1.1.1k-r1","1.1.1l-r0","3.0.0-r0","3.0.0-r1","3.0.0-r2","3.0.0-r3","3.0.0-r4","3.0.1-r0","3.0.1-r1","3.0.2-r0","3.0.3-r0","3.0.5-r0","3.0.5-r1","3.0.5-r2","3.0.5-r3","3.0.6-r0","3.0.7-r0","3.0.7-r1","3.0.7-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-4450.json"}},{"package":{"name":"openssl","ecosystem":"Alpine:v3.20","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.8-r0"}]}],"versions":["1.1.1-r0","1.1.1-r1","1.1.1-r2","1.1.1-r3","1.1.1-r4","1.1.1-r5","1.1.1a-r0","1.1.1a-r1","1.1.1b-r0","1.1.1b-r1","1.1.1c-r0","1.1.1c-r1","1.1.1d-r1","1.1.1d-r2","1.1.1d-r3","1.1.1d-r4","1.1.1d-r5","1.1.1e-r0","1.1.1f-r0","1.1.1g-r0","1.1.1h-r0","1.1.1i-r0","1.1.1j-r0","1.1.1k-r0","1.1.1k-r1","1.1.1l-r0","3.0.0-r0","3.0.0-r1","3.0.0-r2","3.0.0-r3","3.0.0-r4","3.0.1-r0","3.0.1-r1","3.0.2-r0","3.0.3-r0","3.0.5-r0","3.0.5-r1","3.0.5-r2","3.0.5-r3","3.0.6-r0","3.0.7-r0","3.0.7-r1","3.0.7-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-4450.json"}},{"package":{"name":"openssl","ecosystem":"Alpine:v3.21","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.8-r0"}]}],"versions":["1.1.1-r0","1.1.1-r1","1.1.1-r2","1.1.1-r3","1.1.1-r4","1.1.1-r5","1.1.1a-r0","1.1.1a-r1","1.1.1b-r0","1.1.1b-r1","1.1.1c-r0","1.1.1c-r1","1.1.1d-r1","1.1.1d-r2","1.1.1d-r3","1.1.1d-r4","1.1.1d-r5","1.1.1e-r0","1.1.1f-r0","1.1.1g-r0","1.1.1h-r0","1.1.1i-r0","1.1.1j-r0","1.1.1k-r0","1.1.1k-r1","1.1.1l-r0","3.0.0-r0","3.0.0-r1","3.0.0-r2","3.0.0-r3","3.0.0-r4","3.0.1-r0","3.0.1-r1","3.0.2-r0","3.0.3-r0","3.0.5-r0","3.0.5-r1","3.0.5-r2","3.0.5-r3","3.0.6-r0","3.0.7-r0","3.0.7-r1","3.0.7-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-4450.json"}},{"package":{"name":"openssl","ecosystem":"Alpine:v3.22","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.8-r0"}]}],"versions":["1.1.1-r0","1.1.1-r1","1.1.1-r2","1.1.1-r3","1.1.1-r4","1.1.1-r5","1.1.1a-r0","1.1.1a-r1","1.1.1b-r0","1.1.1b-r1","1.1.1c-r0","1.1.1c-r1","1.1.1d-r1","1.1.1d-r2","1.1.1d-r3","1.1.1d-r4","1.1.1d-r5","1.1.1e-r0","1.1.1f-r0","1.1.1g-r0","1.1.1h-r0","1.1.1i-r0","1.1.1j-r0","1.1.1k-r0","1.1.1k-r1","1.1.1l-r0","3.0.0-r0","3.0.0-r1","3.0.0-r2","3.0.0-r3","3.0.0-r4","3.0.1-r0","3.0.1-r1","3.0.2-r0","3.0.3-r0","3.0.5-r0","3.0.5-r1","3.0.5-r2","3.0.5-r3","3.0.6-r0","3.0.7-r0","3.0.7-r1","3.0.7-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-4450.json"}},{"package":{"name":"openssl","ecosystem":"Alpine:v3.23","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.8-r0"}]}],"versions":["1.1.1-r0","1.1.1-r1","1.1.1-r2","1.1.1-r3","1.1.1-r4","1.1.1-r5","1.1.1a-r0","1.1.1a-r1","1.1.1b-r0","1.1.1b-r1","1.1.1c-r0","1.1.1c-r1","1.1.1d-r1","1.1.1d-r2","1.1.1d-r3","1.1.1d-r4","1.1.1d-r5","1.1.1e-r0","1.1.1f-r0","1.1.1g-r0","1.1.1h-r0","1.1.1i-r0","1.1.1j-r0","1.1.1k-r0","1.1.1k-r1","1.1.1l-r0","3.0.0-r0","3.0.0-r1","3.0.0-r2","3.0.0-r3","3.0.0-r4","3.0.1-r0","3.0.1-r1","3.0.2-r0","3.0.3-r0","3.0.5-r0","3.0.5-r1","3.0.5-r2","3.0.5-r3","3.0.6-r0","3.0.7-r0","3.0.7-r1","3.0.7-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-4450.json"}},{"package":{"name":"openssl3","ecosystem":"Alpine:v3.15","purl":"pkg:apk/alpine/openssl3?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.8-r0"}]}],"versions":["1.1.1-r0","1.1.1-r1","1.1.1-r2","1.1.1-r3","1.1.1-r4","1.1.1-r5","1.1.1a-r0","1.1.1a-r1","1.1.1b-r0","1.1.1b-r1","1.1.1c-r0","1.1.1c-r1","1.1.1d-r1","1.1.1d-r2","1.1.1d-r3","1.1.1d-r4","1.1.1d-r5","1.1.1e-r0","1.1.1f-r0","1.1.1g-r0","1.1.1h-r0","1.1.1i-r0","1.1.1j-r0","1.1.1k-r0","1.1.1k-r1","1.1.1l-r0","3.0.0-r0","3.0.0-r1","3.0.0-r2","3.0.0-r3","3.0.0-r4","3.0.2-r0","3.0.3-r0","3.0.5-r0","3.0.5-r1","3.0.6-r0","3.0.7-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-4450.json"}},{"package":{"name":"openssl3","ecosystem":"Alpine:v3.16","purl":"pkg:apk/alpine/openssl3?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.8-r0"}]}],"versions":["1.1.1-r0","1.1.1-r1","1.1.1-r2","1.1.1-r3","1.1.1-r4","1.1.1-r5","1.1.1a-r0","1.1.1a-r1","1.1.1b-r0","1.1.1b-r1","1.1.1c-r0","1.1.1c-r1","1.1.1d-r1","1.1.1d-r2","1.1.1d-r3","1.1.1d-r4","1.1.1d-r5","1.1.1e-r0","1.1.1f-r0","1.1.1g-r0","1.1.1h-r0","1.1.1i-r0","1.1.1j-r0","1.1.1k-r0","1.1.1k-r1","1.1.1l-r0","3.0.0-r0","3.0.0-r1","3.0.0-r2","3.0.0-r3","3.0.0-r4","3.0.1-r0","3.0.1-r1","3.0.2-r0","3.0.3-r0","3.0.5-r0","3.0.5-r1","3.0.6-r0","3.0.7-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-4450.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}