Related Vulnerabilities: CVE-2022-0778  

A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.

Description

A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.

Statement

The versions of `openssl` as shipped with Red Hat Enterprise Linux do not provide support for custom elliptic curve parameters. For this reason, the flaw has been rated as having a security impact of Low on Red Hat Enterprise Linux.

The versions of openssl as shipped with Red Hat Enterprise Linux do not provide support for custom elliptic curve parameters. For this reason, the flaw has been rated as having a security impact of Low on Red Hat Enterprise Linux.

Mitigation

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Additional Information

  • Bugzilla 2062202: CVE-2022-0778 openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
  • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
  • FAQ: Frequently asked questions about CVE-2022-0778