First published: Mon Mar 28 2022(Updated: )
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.<br>Security Fix(es):<br><li> openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-debuginfo | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-debuginfo | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-debugsource | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-debugsource | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-devel | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-devel | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-libs | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-libs | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-libs-debuginfo | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-libs-debuginfo | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-perl | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-perl | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-debuginfo | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-debugsource | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-devel | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-libs | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-libs-debuginfo | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl-perl | <1.1.1g-16.el8_4 | 1.1.1g-16.el8_4 |
redhat/openssl | <1.1.1g-16.el8_4.aa | 1.1.1g-16.el8_4.aa |
redhat/openssl-debuginfo | <1.1.1g-16.el8_4.aa | 1.1.1g-16.el8_4.aa |
redhat/openssl-debugsource | <1.1.1g-16.el8_4.aa | 1.1.1g-16.el8_4.aa |
redhat/openssl-devel | <1.1.1g-16.el8_4.aa | 1.1.1g-16.el8_4.aa |
redhat/openssl-libs | <1.1.1g-16.el8_4.aa | 1.1.1g-16.el8_4.aa |
redhat/openssl-libs-debuginfo | <1.1.1g-16.el8_4.aa | 1.1.1g-16.el8_4.aa |
redhat/openssl-perl | <1.1.1g-16.el8_4.aa | 1.1.1g-16.el8_4.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:1071 is classified as important due to the potential for an infinite loop in BN_mod_sqrt() when parsing certificates.
To fix RHSA-2022:1071, update the OpenSSL package to version 1.1.1g-16.el8_4 or later.
RHSA-2022:1071 affects the OpenSSL packages including openssl, openssl-libs, and openssl-devel among others on RHEL 8.4 systems.
Not addressing RHSA-2022:1071 may lead to security vulnerabilities, specifically the possibility of denial of service through infinite loops during certificate parsing.
There are no official workarounds for RHSA-2022:1071; updating the affected packages is the recommended action.