CVE-2022-36023

Source
https://cve.org/CVERecord?id=CVE-2022-36023
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-36023.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-36023
Aliases
Published
2022-08-18T00:00:00Z
Modified
2025-11-28T04:50:28.372706Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H CVSS Calculator
Summary
Remote denial of service in Hyperledger Fabric Gateway
Details

Hyperledger Fabric is an enterprise-grade permissioned distributed ledger framework for developing solutions and applications. If a gateway client application sends a malformed request to a gateway peer it may crash the peer node. Version 2.4.6 checks for the malformed gateway request and returns an error to the gateway client. There are no known workarounds, users must upgrade to version 2.4.6.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/36xxx/CVE-2022-36023.json",
    "cwe_ids": [
        "CWE-20"
    ]
}
References

Affected packages

Git / github.com/hyperledger/fabric

Affected ranges

Type
GIT
Repo
https://github.com/hyperledger/fabric
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

baseimage-v0.*
baseimage-v0.0.11
v0.*
v0.6.0-preview
v0.6.1-preview
v1.*
v1.0.0
v1.0.0-alpha
v1.0.0-alpha2
v1.0.0-beta
v1.0.0-rc1
v1.1.0-alpha
v1.1.0-preview
v1.1.0-rc1
v1.2.0-rc1
v1.3.0-rc1
v1.4.0-rc1
v2.*
v2.0.0-alpha
v2.0.0-beta
v2.4.0
v2.4.0-alpha
v2.4.0-beta
v2.4.1
v2.4.2
v2.4.3
v2.4.4
v2.4.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-36023.json"