CVE-2022-4450: openssl-src contains Double free after calling `PEM_read_bio_ex`
7.5
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| openssl-src | rust | < 111.25.0 | 111.25.0 |
| openssl-src | rust | >= 300.0.0, < 300.0.12 | 300.0.12 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description clearly states that PEM_read_bio_ex is the primary vulnerable function due to a double free condition. The provided commit patches confirm this by showing modifications in crypto/pem/pem_lib.c within the PEM_read_bio_ex function to nullify pointers after freeing memory in error conditions. The description also explicitly mentions that PEM_read_bio and PEM_read are wrappers around PEM_read_bio_ex and are thus directly affected. Furthermore, PEM_X509_INFO_read_bio_ex and SSL_CTX_use_serverinfo_file are mentioned as indirectly affected because they call the vulnerable functions. The confidence for these indirectly affected functions is medium as their specific file paths are not directly evident from the provided patch information, but their vulnerability is stated in the description.