Show plain JSON{"affected_release": [{"advisory": "RHBA-2023:0589", "cpe": "cpe:/a:redhat:ansible_automation_platform:2.3::el8", "package": "python3x-certifi-0:2022.12.7-1.el8ap", "product_name": "Red Hat Ansible Automation Platform 2.3 for RHEL 8", "release_date": "2023-02-06T00:00:00Z"}, {"advisory": "RHSA-2025:9775", "cpe": "cpe:/a:redhat:ceph_storage:8.1::el9", "package": "ceph-2:19.2.1-222.el9cp", "product_name": "Red Hat Ceph Storage 8.1", "release_date": "2025-06-26T00:00:00Z"}, {"advisory": "RHSA-2025:9775", "cpe": "cpe:/a:redhat:ceph_storage:8.1::el9", "package": "cephadm-ansible-1:4.1.4-1.el9cp", "product_name": "Red Hat Ceph Storage 8.1", "release_date": "2025-06-26T00:00:00Z"}, {"advisory": "RHSA-2025:9775", "cpe": "cpe:/a:redhat:ceph_storage:8.1::el9", "package": "oath-toolkit-0:2.6.12-1.el9cp", "product_name": "Red Hat Ceph Storage 8.1", "release_date": "2025-06-26T00:00:00Z"}, {"advisory": "RHSA-2025:9776", "cpe": "cpe:/a:redhat:ceph_storage:8.1::el9", "package": "rhceph/grafana-rhel9:11.5.2-6", "product_name": "Red Hat Ceph Storage 8.1", "release_date": "2025-06-26T00:00:00Z"}, {"advisory": "RHSA-2025:9776", "cpe": "cpe:/a:redhat:ceph_storage:8.1::el9", "package": "rhceph/keepalived-rhel9:2.2.8-65", "product_name": "Red Hat Ceph Storage 8.1", "release_date": "2025-06-26T00:00:00Z"}, {"advisory": "RHSA-2025:9776", "cpe": "cpe:/a:redhat:ceph_storage:8.1::el9", "package": "rhceph/oauth2-proxy-rhel9:v7.6.0-27", "product_name": "Red Hat Ceph Storage 8.1", "release_date": "2025-06-26T00:00:00Z"}, {"advisory": "RHSA-2025:9776", "cpe": "cpe:/a:redhat:ceph_storage:8.1::el9", "package": "rhceph/rhceph-8-rhel9:8-492", "product_name": "Red Hat Ceph Storage 8.1", "release_date": "2025-06-26T00:00:00Z"}, {"advisory": "RHSA-2025:9776", "cpe": "cpe:/a:redhat:ceph_storage:8.1::el9", "package": "rhceph/rhceph-haproxy-rhel9:2.4.22-67", "product_name": "Red Hat Ceph Storage 8.1", "release_date": "2025-06-26T00:00:00Z"}, {"advisory": "RHSA-2025:9776", "cpe": "cpe:/a:redhat:ceph_storage:8.1::el9", "package": "rhceph/rhceph-promtail-rhel9:v3.0.0-34", "product_name": "Red Hat Ceph Storage 8.1", "release_date": "2025-06-26T00:00:00Z"}, {"advisory": "RHSA-2025:9776", "cpe": "cpe:/a:redhat:ceph_storage:8.1::el9", "package": "rhceph/snmp-notifier-rhel9:1.2.1-115", "product_name": "Red Hat Ceph Storage 8.1", "release_date": "2025-06-26T00:00:00Z"}], "bugzilla": {"description": "python-certifi: untrusted root certificates", "id": "2180089", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180089"}, "csaw": false, "cvss3": {"cvss3_base_score": "7.5", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "status": "verified"}, "cwe": "CWE-345", "details": ["Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from \"TrustCor\" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.", "A flaw was found in python-certifi. Untrusted certificates from TrustCor have been found in the root certificates store."], "name": "CVE-2022-23491", "package_state": [{"cpe": "cpe:/a:redhat:ansible_automation_platform:2", "fix_state": "Affected", "package_name": "python-certifi", "product_name": "Red Hat Ansible Automation Platform 2"}, {"cpe": "cpe:/a:redhat:ceph_storage:4", "fix_state": "Affected", "package_name": "python-certifi", "product_name": "Red Hat Ceph Storage 4"}, {"cpe": "cpe:/a:redhat:ceph_storage:5", "fix_state": "Affected", "package_name": "python-certifi", "product_name": "Red Hat Ceph Storage 5"}, {"cpe": "cpe:/a:redhat:openshift:3.11", "fix_state": "Out of support scope", "package_name": "python-certifi", "product_name": "Red Hat OpenShift Container Platform 3.11"}, {"cpe": "cpe:/a:redhat:openshift_container_storage:4", "fix_state": "Out of support scope", "package_name": "python-certifi", "product_name": "Red Hat Openshift Container Storage 4"}, {"cpe": "cpe:/a:redhat:openshift_data_foundation:4", "fix_state": "Affected", "package_name": "python-certifi", "product_name": "Red Hat Openshift Data Foundation 4"}, {"cpe": "cpe:/a:redhat:openstack:13", "fix_state": "Out of support scope", "package_name": "python-certifi", "product_name": "Red Hat OpenStack Platform 13 (Queens)"}, {"cpe": "cpe:/a:redhat:openstack:16.1", "fix_state": "Not affected", "package_name": "python-certifi", "product_name": "Red Hat OpenStack Platform 16.1"}, {"cpe": "cpe:/a:redhat:openstack:16.2", "fix_state": "Not affected", "package_name": "python-certifi", "product_name": "Red Hat OpenStack Platform 16.2"}, {"cpe": "cpe:/a:redhat:openstack:17.0", "fix_state": "Not affected", "package_name": "python-certifi", "product_name": "Red Hat OpenStack Platform 17.0"}, {"cpe": "cpe:/a:redhat:satellite:6", "fix_state": "Affected", "impact": "low", "package_name": "python-certifi", "product_name": "Red Hat Satellite 6"}, {"cpe": "cpe:/a:redhat:rhui:4::el8", "fix_state": "Not affected", "impact": "low", "package_name": "python-certifi", "product_name": "Red Hat Update Infrastructure 4 for Cloud Providers"}], "public_date": "2022-12-07T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2022-23491\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-23491\nhttps://github.com/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8"], "statement": "Satellite is not vulnerable to this flaw as it ships a build of python-certifi that is patched to use system certs from /etc/pki/tls/certs/ca-bundle.crt.Redhat has rated this CVE as moderate because most redhat products use system-wide root CA certificate bundle instead of certifi bundle.", "threat_severity": "Moderate"}