Unrated severityNVD Advisory· Published Aug 1, 2022· Updated Dec 2, 2025
CVE-2022-2509
CVE-2022-2509
Description
A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.
Affected products
45- gnutls/gnutlsdescription
- osv-coords44 versionspkg:apk/chainguard/gnutlspkg:apk/chainguard/gnutls-c++pkg:apk/chainguard/gnutls-c%2B%2Bpkg:apk/chainguard/gnutls-devpkg:apk/chainguard/gnutls-docpkg:apk/chainguard/gnutls-utilspkg:apk/wolfi/gnutlspkg:apk/wolfi/gnutls-c++pkg:apk/wolfi/gnutls-c%2B%2Bpkg:apk/wolfi/gnutls-devpkg:apk/wolfi/gnutls-docpkg:apk/wolfi/gnutls-utilspkg:rpm/almalinux/gnutlspkg:rpm/almalinux/gnutls-c%2B%2Bpkg:rpm/almalinux/gnutls-danepkg:rpm/almalinux/gnutls-develpkg:rpm/almalinux/gnutls-utilspkg:rpm/opensuse/gnutls&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/gnutls&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/gnutls&distro=openSUSE%20Leap%20Micro%205.2pkg:rpm/opensuse/gnutls&distro=openSUSE%20Tumbleweedpkg:rpm/suse/gnutls&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/gnutls&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-ESPOSpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-BCLpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/gnutls&distro=SUSE%20Manager%20Proxy%204.1pkg:rpm/suse/gnutls&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.1pkg:rpm/suse/gnutls&distro=SUSE%20Manager%20Server%204.1
< 0+ 43 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 3.7.6-12.el9_0
- (no CPE)range: < 3.7.6-12.el9_0
- (no CPE)range: < 3.7.6-12.el9_0
- (no CPE)range: < 3.7.6-12.el9_0
- (no CPE)range: < 3.7.6-12.el9_0
- (no CPE)range: < 3.6.7-150200.14.19.2
- (no CPE)range: < 3.7.3-150400.4.10.1
- (no CPE)range: < 3.6.7-150200.14.19.2
- (no CPE)range: < 3.7.7-1.1
- (no CPE)range: < 3.6.7-150000.6.45.2
- (no CPE)range: < 3.6.7-150200.14.19.2
- (no CPE)range: < 3.6.7-150000.6.45.2
- (no CPE)range: < 3.6.7-150000.6.45.2
- (no CPE)range: < 3.6.7-150200.14.19.2
- (no CPE)range: < 3.6.7-150200.14.19.2
- (no CPE)range: < 3.6.7-150000.6.45.2
- (no CPE)range: < 3.6.7-150000.6.45.2
- (no CPE)range: < 3.6.7-150200.14.19.2
- (no CPE)range: < 3.6.7-150200.14.19.2
- (no CPE)range: < 3.6.7-150200.14.19.2
- (no CPE)range: < 3.7.3-150400.4.10.1
- (no CPE)range: < 3.6.7-150000.6.45.2
- (no CPE)range: < 3.6.7-150000.6.45.2
- (no CPE)range: < 3.6.7-150200.14.19.2
- (no CPE)range: < 3.6.7-150200.14.19.2
- (no CPE)range: < 3.6.7-150000.6.45.2
- (no CPE)range: < 3.6.7-150000.6.45.2
- (no CPE)range: < 3.6.7-150000.6.45.2
- (no CPE)range: < 3.6.7-150200.14.19.2
- (no CPE)range: < 3.6.7-150200.14.19.2
- (no CPE)range: < 3.6.7-150200.14.19.2
- (no CPE)range: < 3.6.7-150200.14.19.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FL27JS3VM74YEQU7PGB62USO3KSBYZX/mitrevendor-advisoryx_refsource_FEDORA
- www.debian.org/security/2022/dsa-5203mitrevendor-advisoryx_refsource_DEBIAN
- access.redhat.com/security/cve/CVE-2022-2509mitrex_refsource_MISC
- lists.debian.org/debian-lts-announce/2022/08/msg00002.htmlmitremailing-listx_refsource_MLIST
- lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.htmlmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.