{
  "document": {
    "aggregate_severity": {
      "text": "Medium"
    },
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/ubuntu20.04els/vex/2022/cve-2022-4304-els_os-ubuntu20_04els.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-05-04T18:52:31Z",
      "generator": {
        "date": "2026-05-04T18:52:31Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CVE-2022-4304-ELS_OS-UBUNTU20.04ELS",
      "initial_release_date": "2022-01-01T00:00:00Z",
      "revision_history": [
        {
          "date": "2022-01-01T00:00:00Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-04-20T12:25:25Z",
          "number": "2",
          "summary": "Official Publication"
        },
        {
          "date": "2026-05-04T18:52:31Z",
          "number": "3",
          "summary": "Update document"
        }
      ],
      "status": "final",
      "version": "3"
    },
    "title": "Security update on CVE-2022-4304"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu 20.04",
                "product": {
                  "name": "Ubuntu 20.04",
                  "product_id": "Ubuntu-20",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Ubuntu"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libssl-dev-0:1.1.1f-1ubuntu2.24.amd64",
                "product": {
                  "name": "libssl-dev-0:1.1.1f-1ubuntu2.24.amd64",
                  "product_id": "libssl-dev-0:1.1.1f-1ubuntu2.24.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/ubuntu/libssl-dev@1.1.1f-1ubuntu2.24?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:1.1.1f-1ubuntu2.24.amd64",
                "product": {
                  "name": "openssl-0:1.1.1f-1ubuntu2.24.amd64",
                  "product_id": "openssl-0:1.1.1f-1ubuntu2.24.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/ubuntu/openssl@1.1.1f-1ubuntu2.24?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libssl1.1-0:1.1.1f-1ubuntu2.24.amd64",
                "product": {
                  "name": "libssl1.1-0:1.1.1f-1ubuntu2.24.amd64",
                  "product_id": "libssl1.1-0:1.1.1f-1ubuntu2.24.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/ubuntu/libssl1.1@1.1.1f-1ubuntu2.24?arch=amd64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libssl-doc-0:1.1.1f-1ubuntu2.24.all",
                "product": {
                  "name": "libssl-doc-0:1.1.1f-1ubuntu2.24.all",
                  "product_id": "libssl-doc-0:1.1.1f-1ubuntu2.24.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/ubuntu/libssl-doc@1.1.1f-1ubuntu2.24?arch=all"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "all"
          }
        ],
        "category": "vendor",
        "name": "Canonical Ltd."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els2.amd64",
                "product": {
                  "name": "libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els2.amd64",
                  "product_id": "libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els2.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/libssl-dev@1.1.1f-1ubuntu2.24%2Btuxcare.els2?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
                "product": {
                  "name": "libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
                  "product_id": "libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/libssl-dev@1.1.1f-1ubuntu2.24%2Btuxcare.els3?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
                "product": {
                  "name": "openssl-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
                  "product_id": "openssl-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/openssl@1.1.1f-1ubuntu2.24%2Btuxcare.els3?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libssl1.1-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
                "product": {
                  "name": "libssl1.1-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
                  "product_id": "libssl1.1-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/libssl1.1@1.1.1f-1ubuntu2.24%2Btuxcare.els3?arch=amd64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libssl-doc-0:1.1.1f-1ubuntu2.24+tuxcare.els3.all",
                "product": {
                  "name": "libssl-doc-0:1.1.1f-1ubuntu2.24+tuxcare.els3.all",
                  "product_id": "libssl-doc-0:1.1.1f-1ubuntu2.24+tuxcare.els3.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/libssl-doc@1.1.1f-1ubuntu2.24%2Btuxcare.els3?arch=all"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "all"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els2.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els2.amd64"
        },
        "product_reference": "libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els2.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64"
        },
        "product_reference": "libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libssl-dev-0:1.1.1f-1ubuntu2.24.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:libssl-dev-0:1.1.1f-1ubuntu2.24.amd64"
        },
        "product_reference": "libssl-dev-0:1.1.1f-1ubuntu2.24.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:openssl-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64"
        },
        "product_reference": "openssl-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:1.1.1f-1ubuntu2.24.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:openssl-0:1.1.1f-1ubuntu2.24.amd64"
        },
        "product_reference": "openssl-0:1.1.1f-1ubuntu2.24.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libssl-doc-0:1.1.1f-1ubuntu2.24+tuxcare.els3.all as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:libssl-doc-0:1.1.1f-1ubuntu2.24+tuxcare.els3.all"
        },
        "product_reference": "libssl-doc-0:1.1.1f-1ubuntu2.24+tuxcare.els3.all",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libssl-doc-0:1.1.1f-1ubuntu2.24.all as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:libssl-doc-0:1.1.1f-1ubuntu2.24.all"
        },
        "product_reference": "libssl-doc-0:1.1.1f-1ubuntu2.24.all",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libssl1.1-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:libssl1.1-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64"
        },
        "product_reference": "libssl1.1-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libssl1.1-0:1.1.1f-1ubuntu2.24.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:libssl1.1-0:1.1.1f-1ubuntu2.24.amd64"
        },
        "product_reference": "libssl1.1-0:1.1.1f-1ubuntu2.24.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-4304",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "description",
          "text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation\nwhich could be sufficient to recover a plaintext across a network in a\nBleichenbacher style attack. To achieve a successful decryption an attacker\nwould have to be able to send a very large number of trial messages for\ndecryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5,\nRSA-OEAP and RSASVE.\n\nFor example, in a TLS connection, RSA is commonly used by a client to send an\nencrypted pre-master secret to the server. An attacker that had observed a\ngenuine connection between a client and a server could use this flaw to send\ntrial messages to the server and record the time taken to process them. After a\nsufficiently large number of messages the attacker could recover the pre-master\nsecret used for the original connection and thus be able to decrypt the\napplication data sent over that connection.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "known_affected": [
          "Ubuntu-20:libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els2.amd64",
          "Ubuntu-20:libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
          "Ubuntu-20:libssl-dev-0:1.1.1f-1ubuntu2.24.amd64",
          "Ubuntu-20:libssl-doc-0:1.1.1f-1ubuntu2.24+tuxcare.els3.all",
          "Ubuntu-20:libssl-doc-0:1.1.1f-1ubuntu2.24.all",
          "Ubuntu-20:libssl1.1-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
          "Ubuntu-20:libssl1.1-0:1.1.1f-1ubuntu2.24.amd64",
          "Ubuntu-20:openssl-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
          "Ubuntu-20:openssl-0:1.1.1f-1ubuntu2.24.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-4304"
        },
        {
          "category": "external",
          "summary": "https://security.gentoo.org/glsa/202402-08",
          "url": "https://security.gentoo.org/glsa/202402-08"
        },
        {
          "category": "external",
          "summary": "https://www.openssl.org/news/secadv/20230207.txt",
          "url": "https://www.openssl.org/news/secadv/20230207.txt"
        },
        {
          "category": "external",
          "summary": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003",
          "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003"
        }
      ],
      "release_date": "2023-02-08T20:15:00Z",
      "remediations": [
        {
          "category": "no_fix_planned",
          "details": "- CVE-2022-4304 is only exploitable when a service acts as an RSA decryption oracle and processes a very large number of attacker‑chosen ciphertexts with measurable timing differences, and it provides no code‑execution or integrity impact. \n- Standard TLS deployments that negotiate TLS 1.3 or TLS 1.2 with ECDHE cipher suites never perform RSA decryption (only signatures), so this side channel does not apply; exposure is mainly limited to legacy TLS_RSA key transport or applications that explicitly offer RSA decryption. \n- Given these strict preconditions and the high complexity of gathering reliable timing over the network, this vulnerability can be safely deprioritized in centrally managed enterprise VM/server environments.",
          "product_ids": [
            "Ubuntu-20:libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els2.amd64",
            "Ubuntu-20:libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
            "Ubuntu-20:libssl-dev-0:1.1.1f-1ubuntu2.24.amd64",
            "Ubuntu-20:libssl-doc-0:1.1.1f-1ubuntu2.24+tuxcare.els3.all",
            "Ubuntu-20:libssl-doc-0:1.1.1f-1ubuntu2.24.all",
            "Ubuntu-20:libssl1.1-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
            "Ubuntu-20:libssl1.1-0:1.1.1f-1ubuntu2.24.amd64",
            "Ubuntu-20:openssl-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
            "Ubuntu-20:openssl-0:1.1.1f-1ubuntu2.24.amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els2.amd64",
            "Ubuntu-20:libssl-dev-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
            "Ubuntu-20:libssl-dev-0:1.1.1f-1ubuntu2.24.amd64",
            "Ubuntu-20:libssl-doc-0:1.1.1f-1ubuntu2.24+tuxcare.els3.all",
            "Ubuntu-20:libssl-doc-0:1.1.1f-1ubuntu2.24.all",
            "Ubuntu-20:libssl1.1-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
            "Ubuntu-20:libssl1.1-0:1.1.1f-1ubuntu2.24.amd64",
            "Ubuntu-20:openssl-0:1.1.1f-1ubuntu2.24+tuxcare.els3.amd64",
            "Ubuntu-20:openssl-0:1.1.1f-1ubuntu2.24.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    }
  ]
}