CVE-2022-3358
- EPSS 15.5%
- Published 11.10.2022 15:15:10
- Last modified 21.11.2024 07:19:21
OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_meth_new() function and associated function calls. This function was deprecated in OpenSSL 3.0 and application authors are instead encouraged to use the new provider mechanism in ord...
CVE-2022-2097
- EPSS 0.41%
- Published 05.07.2022 11:15:08
- Last modified 21.11.2024 07:00:18
AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't writte...
- EPSS 56.5%
- Published 01.07.2022 08:15:07
- Last modified 21.11.2024 07:00:40
The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption w...
- EPSS 25.23%
- Published 21.06.2022 15:15:09
- Last modified 15.09.2025 14:15:33
In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022...
- EPSS 46.34%
- Published 03.05.2022 16:15:18
- Last modified 13.08.2025 14:15:28
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execut...
CVE-2022-1343
- EPSS 0.13%
- Published 03.05.2022 16:15:18
- Last modified 05.05.2025 17:17:34
The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the res...
CVE-2022-1434
- EPSS 0.06%
- Published 03.05.2022 16:15:18
- Last modified 21.11.2024 06:40:43
The OpenSSL 3.0 implementation of the RC4-MD5 ciphersuite incorrectly uses the AAD data as the MAC key. This makes the MAC key trivially predictable. An attacker could exploit this issue by performing a man-in-the-middle attack to modify data being s...
CVE-2022-1473
- EPSS 0.28%
- Published 03.05.2022 16:15:18
- Last modified 05.05.2025 17:17:34
The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically de...
CVE-2022-0778
- EPSS 7.81%
- Published 15.03.2022 17:15:08
- Last modified 21.11.2024 06:39:22
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed ...
CVE-2021-4160
- EPSS 0.3%
- Published 28.01.2022 22:15:15
- Last modified 21.11.2024 06:37:02
There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlik...