UBUNTU-CVE-2022-36937

Source
https://ubuntu.com/security/CVE-2022-36937
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-36937.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2022-36937
Related
Published
2023-05-10T19:15:00Z
Modified
2025-01-13T10:23:30Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

HHVM 4.172.0 and all prior versions use TLS 1.0 for secure connections when handling tls:// URLs in the stream extension. TLS1.0 has numerous published vulnerabilities and is deprecated. HHVM 4.153.4, 4.168.2, 4.169.2, 4.170.2, 4.171.1, 4.172.1, 4.173.0 replaces TLS1.0 with TLS1.3. Applications that call streamsocketserver or streamsocketclient functions with a URL starting with tls:// are affected.

References

Affected packages

Ubuntu:Pro:16.04:LTS / hhvm

Package

Name
hhvm
Purl
pkg:deb/ubuntu/hhvm@3.11.1+dfsg-1ubuntu1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.11.0+dfsg-1
3.11.1+dfsg-1
3.11.1+dfsg-1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / hhvm

Package

Name
hhvm
Purl
pkg:deb/ubuntu/hhvm@3.21.0+dfsg-2ubuntu2?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.21.0+dfsg-2
3.21.0+dfsg-2build1
3.21.0+dfsg-2build2
3.21.0+dfsg-2build3
3.21.0+dfsg-2ubuntu2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}