Patches for a High-Severity RCE Bug have been released by OpenSSL

Patches for a High-Severity RCE Bug have been released by OpenSSL

The maintainers of the OpenSSL project have distributed patches to fix a critical flaw in the cryptographic library. This flaw, which could in some circumstances result in the execution of code remotely, was discovered by the project's maintainers.


The problem, which has been given the identifier CVE-2022-2274, has been described as a case of heap memory corruption with RSA private key operation. This issue was first introduced in version 3.0.4 of OpenSSL, which was released on June 21, 2022.


OpenSSL is a general-purpose cryptography library that was first made available to the public in 1998. It provides an open-source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, allowing users to generate private keys, create certificate signing requests (CSRs), and install SSL/TLS certificates. OpenSSL was initially developed by the Open Group.


According to the advisory, "SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86 64 architecture are affected by this issue." [Citation needed] [Citation needed] [Citation needed] [Citation needed] [Citation needed] [Citation needed]


The maintainers of the software stated that the flaw, which they referred to as a "serious bug in the RSA implementation," could result in memory corruption during computation. This flaw could be exploited by an adversary in order to trigger remote code execution on the machine that was performing the computation.


On June 22, 2022, the vulnerability was reported to OpenSSL by Xi Ruoyao, who was a Ph.D. student at Xidian University. Xi Ruoyao received credit for this. It is strongly suggested that anyone who uses the library upgrades to OpenSSL version 3.0.5 in order to protect themselves from any potential dangers.

0 Comments

Your suggestions and comments are welcome

Post a Comment

Your suggestions and comments are welcome

Post a Comment (0)

Previous Post Next Post