{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"LOW"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"A vulnerability was found in Dalli. It has been classified as problematic. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to apply a patch to fix this issue. VDB-214026 is the identifier assigned to this vulnerability.",
				"category":"general",
				"title":"Synopsis"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4064"
			},
			{
				"summary":"CVE-2022-4064 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/cve/2022/csaf-openeuler-cve-2022-4064.json"
			},
			{
				"summary":"openEuler-SA-2023-1002",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1002"
			},
			{
				"summary":"CVE-2022-4064",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2022-4064&packageName=rubygem-dalli"
			}
		],
		"title":"openEuler cve CVE-2022-4064",
		"tracking":{
			"initial_release_date":"2023-01-06T14:14:04+08:00",
			"revision_history":[
				{
					"date":"2023-01-06T14:14:04+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T14:14:04+08:00",
					"summary":"Current version",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T14:14:04+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T14:14:04+08:00",
			"id":"CVE-2022-4064",
			"version":"2.0.0",
			"status":"interim"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"openEuler-22.03-LTS-SP1",
									"name":"openEuler-22.03-LTS-SP1"
								},
								"name":"openEuler-22.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"noarch",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"rubygem-dalli-doc-3.2.2-2.oe2203sp1.noarch.rpm",
									"name":"rubygem-dalli-doc-3.2.2-2.oe2203sp1.noarch.rpm"
								},
								"name":"rubygem-dalli-doc-3.2.2-2.oe2203sp1.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"rubygem-dalli-3.2.2-2.oe2203sp1.noarch.rpm",
									"name":"rubygem-dalli-3.2.2-2.oe2203sp1.noarch.rpm"
								},
								"name":"rubygem-dalli-3.2.2-2.oe2203sp1.noarch.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"rubygem-dalli-3.2.2-2.oe2203sp1.src.rpm",
									"name":"rubygem-dalli-3.2.2-2.oe2203sp1.src.rpm"
								},
								"name":"rubygem-dalli-3.2.2-2.oe2203sp1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"rubygem-dalli-doc-3.2.2-2.oe2203sp1.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:rubygem-dalli-doc-3.2.2-2.oe2203sp1.noarch",
					"name":"rubygem-dalli-doc-3.2.2-2.oe2203sp1.noarch as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"rubygem-dalli-3.2.2-2.oe2203sp1.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:rubygem-dalli-3.2.2-2.oe2203sp1.noarch",
					"name":"rubygem-dalli-3.2.2-2.oe2203sp1.noarch as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"rubygem-dalli-3.2.2-2.oe2203sp1.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:rubygem-dalli-3.2.2-2.oe2203sp1.src",
					"name":"rubygem-dalli-3.2.2-2.oe2203sp1.src as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2022-4064",
			"notes":[
				{
					"text":"A vulnerability was found in Dalli. It has been classified as problematic. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to apply a patch to fix this issue. VDB-214026 is the identifier assigned to this vulnerability.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:rubygem-dalli-doc-3.2.2-2.oe2203sp1.noarch",
					"openEuler-22.03-LTS-SP1:rubygem-dalli-3.2.2-2.oe2203sp1.noarch",
					"openEuler-22.03-LTS-SP1:rubygem-dalli-3.2.2-2.oe2203sp1.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:rubygem-dalli-doc-3.2.2-2.oe2203sp1.noarch",
						"openEuler-22.03-LTS-SP1:rubygem-dalli-3.2.2-2.oe2203sp1.noarch",
						"openEuler-22.03-LTS-SP1:rubygem-dalli-3.2.2-2.oe2203sp1.src"
					],
					"details":"rubygem-dalli security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1002"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.7,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:rubygem-dalli-doc-3.2.2-2.oe2203sp1.noarch",
						"openEuler-22.03-LTS-SP1:rubygem-dalli-3.2.2-2.oe2203sp1.noarch",
						"openEuler-22.03-LTS-SP1:rubygem-dalli-3.2.2-2.oe2203sp1.src"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2022-4064"
		}
	]
}