Описание
The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | |
| devel | not-affected | |
| esm-apps/bionic | not-affected | |
| esm-apps/xenial | needed | |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/focal | not-affected | |
| focal | not-affected | |
| impish | not-affected | |
| jammy | not-affected | |
| kinetic | not-affected |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | uses system openssl1.0 |
| devel | not-affected | uses system openssl1.1 |
| esm-apps/bionic | not-affected | uses system openssl1.0 |
| esm-apps/focal | not-affected | uses system openssl1.1 |
| esm-apps/jammy | not-affected | uses system openssl1.1 |
| esm-apps/noble | not-affected | uses system openssl1.1 |
| esm-apps/xenial | not-affected | uses system openssl |
| esm-infra-legacy/trusty | not-affected | uses system openssl |
| focal | not-affected | uses system openssl1.1 |
| impish | not-affected | uses system openssl1.1 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | openssl 3 only |
| devel | not-affected | 3.0.4-1ubuntu1 |
| esm-infra-legacy/trusty | not-affected | openssl 3 only |
| esm-infra/bionic | not-affected | openssl 3 only |
| esm-infra/focal | not-affected | openssl 3 only |
| esm-infra/xenial | not-affected | openssl 3 only |
| fips-preview/jammy | not-affected | openssl 3.0.4 only |
| fips-updates/bionic | not-affected | openssl 3 only |
| fips-updates/focal | not-affected | openssl 3 only |
| fips-updates/jammy | not-affected | openssl 3.0.4 only |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | openssl 3 only |
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/bionic | not-affected | openssl 3 only |
| esm-infra/focal | DNE | |
| focal | DNE | |
| impish | DNE | |
| jammy | DNE | |
| kinetic | DNE | |
| lunar | DNE |
Показывать по
10 Critical
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.
The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.
The OpenSSL 3.0.4 release introduced a serious bug in the RSA implemen ...
openssl-src heap memory corruption with RSA private key operation
Уязвимость функции bn_reduce_once_in_place библиотеки OpenSSL, позволяющая нарушителю выполнить произвольный код
10 Critical
CVSS2
9.8 Critical
CVSS3