Miggo Logo

CVE-2022-4450: openssl-src contains Double free after calling `PEM_read_bio_ex`

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.33334%
Published
2/8/2023
Updated
2/13/2025
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
openssl-srcrust< 111.25.0111.25.0
openssl-srcrust>= 300.0.0, < 300.0.12300.0.12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description clearly states that PEM_read_bio_ex is the primary vulnerable function due to a double free condition. The provided commit patches confirm this by showing modifications in crypto/pem/pem_lib.c within the PEM_read_bio_ex function to nullify pointers after freeing memory in error conditions. The description also explicitly mentions that PEM_read_bio and PEM_read are wrappers around PEM_read_bio_ex and are thus directly affected. Furthermore, PEM_X509_INFO_read_bio_ex and SSL_CTX_use_serverinfo_file are mentioned as indirectly affected because they call the vulnerable functions. The confidence for these indirectly affected functions is medium as their specific file paths are not directly evident from the provided patch information, but their vulnerability is stated in the description.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** *un*tion `P*M_r***_*io_*x()` r***s * P*M *il* *rom * *IO *n* p*rs*s *n* ***o**s t** "n*m*" (*.*. "**RTI*I**T*"), *ny *****r **t* *n* t** p*ylo** **t*. I* t** *un*tion su*****s t**n t** "n*m*_out", "*****r" *n* "**t*" *r*um*nts *r* popul*t** wit*

Reasoning

T** vuln*r**ility **s*ription *l**rly st*t*s t**t `P*M_r***_*io_*x` is t** prim*ry vuln*r**l* *un*tion *u* to * *ou*l* *r** *on*ition. T** provi*** *ommit p*t***s *on*irm t*is *y s*owin* mo*i*i**tions in `*rypto/p*m/p*m_li*.*` wit*in t** `P*M_r***_*i