The development team behind the OpenSSL project fixed a high-severity bug in the library that could potentially lead to remote code execution.
This bug makes the RSA implementation with 2048 bit private keys incorrect on such machines and triggers a memory corruption during the computation. A remote attacker can exploit the memory corruption to achieve code execution on the machine while performing the computation.
The CVE-2022-2274 vulnerability was introduced in OpenSSL version 3.0.4 released on June 21, 2022.
“The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation.” reads the advisory published by the Project Maintainers. “SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.”
The OpenSSL software library allows secure communications over computer networks against eavesdropping or need to identify the party at the other end. OpenSSL contains an open-source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols.
The vulnerability was reported to project maintainers on 22nd June 2022 by Ph.D. student Xi Ruoyao who also developed the patch.
The flaw has been addressed with the release of OpenSSL version 3.0.5, users of the library have to upgrade their instances as soon as possible.
(SecurityAffairs – hacking, encryption)