CVE-2022-36111

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-36111
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-36111.json
Aliases
Published
2022-11-23T18:15:11Z
Modified
2023-11-29T09:48:32.235192Z
Details

immudb is a database with built-in cryptographic proof and verification. In versions prior to 1.4.1, a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operations resulting in acceptance of an invalid state value. This vulnerability only affects immudb client SDKs, the immudb server itself is not affected by this vulnerability. This issue has been patched in version 1.4.1.

References

Affected packages

Git / github.com/codenotary/immudb

Affected ranges

Type
GIT
Repo
https://github.com/codenotary/immudb
Events
Introduced
0The exact introduced commit is unknown
Fixed

Affected versions

cnlc-2.*

cnlc-2.2

v0.*

v0.0.0-20200206
v0.6.0
v0.6.0-RC1
v0.6.0-RC2
v0.6.1
v0.6.2
v0.7.0
v0.8.0
v0.8.1
v0.9.0
v0.9.0-RC1
v0.9.0-RC2
v0.9.1
v0.9.2

v1.*

v1.0.0
v1.0.1
v1.0.5
v1.1.0
v1.2.0
v1.2.0-RC1
v1.2.1
v1.2.2
v1.2.3
v1.2.3-RC1
v1.2.4
v1.2.4-RC1
v1.3.0
v1.3.0-RC1
v1.3.1
v1.3.1-RC1
v1.3.2
v1.3.2-RC1
v1.4.0
v1.4.0-RC1
v1.4.0-RC2
v1.4.1-RC1