linux.oracle.com
Open in
urlscan Pro
2a02:26f0:3100:786::a15
Public Scan
URL:
https://linux.oracle.com/cve/CVE-2022-47629.html
Submission: On July 18 via api from GB — Scanned from GB
Submission: On July 18 via api from GB — Scanned from GB
Form analysis
0 forms found in the DOMText Content
Oracle * ULN * Support * Documentation * Downloads STAY CONNECTED: * Facebook * Twitter * LinkedIn * YouTube * Blog CVE-2022-47629 * ULN > * Oracle Linux CVE repository > * CVE-2022-47629 CVE DETAILS Release Date:2022-12-20 DESCRIPTION Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser. See more information about CVE-2022-47629 from MITRE CVE dictionary and NIST NVD CVSS V3.0 METRICS NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review. Base Score: 9.8 Base Metrics: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Access Vector: Network Attack Complexity: Low Privileges Required: None User Interaction: None Scope: Unchanged Confidentiality Impact: High Integrity Impact: High Availability Impact: High ERRATA INFORMATION PlatformErrataRelease Date Oracle Linux version 7 (libksba)ELSA-2023-05302023-01-30Oracle Linux version 8 (libksba)ELSA-2023-06252023-02-07Oracle Linux version 9 (libksba)ELSA-2023-06262023-02-08 This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team TECHNICAL INFORMATION * Oracle Linux Certified Hardware * Oracle Linux Supported Releases ORACLE LINUX SUPPORT * Oracle Linux Support * Oracle Premier Support for Systems * Advanced Customer Services CONNECT * Facebook * Twitter * LinkedIn * YouTube * Blog CONTACT US * Global contacts * Oracle 1-800-633-0691 Subscribe | Careers | Contact Us | Legal Notices | Terms of Use | Your Privacy Rights