Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2022:1065

Опубликовано: 08 апр. 2022
Источник: rocky
Оценка: Important

Описание

Important: openssl security update

For more information visit https://errata.rockylinux.org/RLSA-2022:1065

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
opensslx86_646.el8_5openssl-1.1.1k-6.el8_5.x86_64.rpm
openssl-develi6866.el8_5openssl-devel-1.1.1k-6.el8_5.i686.rpm
openssl-develx86_646.el8_5openssl-devel-1.1.1k-6.el8_5.x86_64.rpm
openssl-libsi6866.el8_5openssl-libs-1.1.1k-6.el8_5.i686.rpm
openssl-libsx86_646.el8_5openssl-libs-1.1.1k-6.el8_5.x86_64.rpm
openssl-perlx86_646.el8_5openssl-perl-1.1.1k-6.el8_5.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 3 лет назад

The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities...

CVSS3: 7.5
redhat
больше 3 лет назад

The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities...

CVSS3: 7.5
nvd
больше 3 лет назад

The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities pa

CVSS3: 7.5
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 3 лет назад

The BN_mod_sqrt() function, which computes a modular square root, cont ...