CVE-2022-3786
- EPSS 20.63%
- Veröffentlicht 01.11.2022 18:15:11
- Zuletzt bearbeitet 04.11.2025 20:16:04
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for...
CVE-2022-3602
- EPSS 83.22%
- Veröffentlicht 01.11.2022 18:15:10
- Zuletzt bearbeitet 04.11.2025 20:16:04
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or f...
CVE-2022-3358
- EPSS 15.63%
- Veröffentlicht 11.10.2022 15:15:10
- Zuletzt bearbeitet 21.11.2024 07:19:21
OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_meth_new() function and associated function calls. This function was deprecated in OpenSSL 3.0 and application authors are instead encouraged to use the new provider mechanism in ord...
CVE-2022-2097
- EPSS 0.41%
- Veröffentlicht 05.07.2022 11:15:08
- Zuletzt bearbeitet 21.11.2024 07:00:18
AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't writte...
- EPSS 55.91%
- Veröffentlicht 01.07.2022 08:15:07
- Zuletzt bearbeitet 21.11.2024 07:00:40
The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption w...
- EPSS 18.58%
- Veröffentlicht 21.06.2022 15:15:09
- Zuletzt bearbeitet 03.11.2025 22:15:58
In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022...
- EPSS 41.21%
- Veröffentlicht 03.05.2022 16:15:18
- Zuletzt bearbeitet 13.08.2025 14:15:28
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execut...
CVE-2022-1343
- EPSS 0.15%
- Veröffentlicht 03.05.2022 16:15:18
- Zuletzt bearbeitet 05.05.2025 17:17:34
The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the res...
CVE-2022-1434
- EPSS 0.07%
- Veröffentlicht 03.05.2022 16:15:18
- Zuletzt bearbeitet 21.11.2024 06:40:43
The OpenSSL 3.0 implementation of the RC4-MD5 ciphersuite incorrectly uses the AAD data as the MAC key. This makes the MAC key trivially predictable. An attacker could exploit this issue by performing a man-in-the-middle attack to modify data being s...
CVE-2022-1473
- EPSS 0.3%
- Veröffentlicht 03.05.2022 16:15:18
- Zuletzt bearbeitet 05.05.2025 17:17:34
The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically de...