<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CVE-2022-0778 OpenSSL infinite loop vulnerability in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2022-0778-openssl-infinite-loop-vulnerability/m-p/477785#M1577</link>
    <description>&lt;P&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2022-0778" target="_blank"&gt;CVE-2022-0778 Impact of the OpenSSL Infinite Loop Vulnerability CVE-2022-0778 (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Further to this one, it mentions that Globalprotect is affected but doesnt say whether a client software update is required.&lt;/P&gt;&lt;P&gt;Do you know if the Globalprotect client will need updating?&lt;/P&gt;</description>
    <pubDate>Mon, 04 Apr 2022 02:34:01 GMT</pubDate>
    <dc:creator>JimMcGrady</dc:creator>
    <dc:date>2022-04-04T02:34:01Z</dc:date>
    <item>
      <title>CVE-2022-0778 OpenSSL infinite loop vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2022-0778-openssl-infinite-loop-vulnerability/m-p/477785#M1577</link>
      <description>&lt;P&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2022-0778" target="_blank"&gt;CVE-2022-0778 Impact of the OpenSSL Infinite Loop Vulnerability CVE-2022-0778 (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Further to this one, it mentions that Globalprotect is affected but doesnt say whether a client software update is required.&lt;/P&gt;&lt;P&gt;Do you know if the Globalprotect client will need updating?&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2022 02:34:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2022-0778-openssl-infinite-loop-vulnerability/m-p/477785#M1577</guid>
      <dc:creator>JimMcGrady</dc:creator>
      <dc:date>2022-04-04T02:34:01Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-0778 OpenSSL infinite loop vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2022-0778-openssl-infinite-loop-vulnerability/m-p/477976#M1579</link>
      <description>&lt;P&gt;The CVE says they are working on "&lt;SPAN&gt;fixes to remove the vulnerable code from our PAN-OS, &lt;/SPAN&gt;&lt;EM&gt;GlobalProtect app&lt;/EM&gt;&lt;SPAN&gt;, and Cortex XDR agent", so i am expecting GP client software as well as the PANOS. But yeah... kind of left us hanging in the initial CVE release saying to update to the "-hf" release... which doesn't exist yet, then later updating the CVE to "ETA April '22".&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2022 15:16:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2022-0778-openssl-infinite-loop-vulnerability/m-p/477976#M1579</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-04-04T15:16:51Z</dc:date>
    </item>
  </channel>
</rss>

