Use After Free Affecting opensearch-2 package, versions <2.11.1-r1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-WOLFILATEST-OPENSEARCH2-6114630
- published 9 Dec 2023
- disclosed 21 Nov 2022
Introduced: 21 Nov 2022
CVE-2022-45146 Open this link in a new tabHow to fix?
Upgrade Wolfi
opensearch-2
to version 2.11.1-r1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream opensearch-2
package and not the opensearch-2
package as distributed by Wolfi
.
See How to fix?
for Wolfi
relevant fixed versions and status.
An issue was discovered in the FIPS Java API of Bouncy Castle BC-FJA before 1.0.2.4. Changes to the JVM garbage collector in Java 13 and later trigger an issue in the BC-FJA FIPS modules where it is possible for temporary keys used by the module to be zeroed out while still in use by the module, resulting in errors or potential information loss. NOTE: FIPS compliant users are unaffected because the FIPS certification is only for Java 7, 8, and 11.