CVE-2022-0778
Description
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
openssl-srccrates.io | >= 300.0.0, < 300.0.5 | 300.0.5 |
openssl-srccrates.io | < 111.18.0 | 111.18.0 |
Affected products
17- cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*
Patches
1478564373fee5e2b50213cf1241a163ac5ccfc04a203a10e2ad3ac55641f14ffffd98a5accb1316b8d213cdb72ea5d9139e0bba5648e9442e84a358d7db3d88267f61e818b74be217e04bd3433fd81bf649b5998aVulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
43- packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.htmlnvdThird Party AdvisoryVDB EntryWEB
- seclists.org/fulldisclosure/2022/May/33nvdMailing ListThird Party AdvisoryWEB
- seclists.org/fulldisclosure/2022/May/35nvdMailing ListThird Party AdvisoryWEB
- seclists.org/fulldisclosure/2022/May/38nvdMailing ListThird Party AdvisoryWEB
- cert-portal.siemens.com/productcert/pdf/ssa-712929.pdfnvdThird Party AdvisoryWEB
- github.com/advisories/GHSA-x3mh-jvjw-3xwxghsaADVISORY
- lists.debian.org/debian-lts-announce/2022/03/msg00023.htmlnvdMailing ListThird Party AdvisoryWEB
- lists.debian.org/debian-lts-announce/2022/03/msg00024.htmlnvdMailing ListThird Party AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2022-0778ghsaADVISORY
- psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002nvdThird Party AdvisoryWEB
- security.gentoo.org/glsa/202210-02nvdThird Party AdvisoryWEB
- security.netapp.com/advisory/ntap-20220321-0002/nvdThird Party Advisory
- security.netapp.com/advisory/ntap-20220429-0005/nvdThird Party Advisory
- support.apple.com/kb/HT213255nvdThird Party AdvisoryWEB
- support.apple.com/kb/HT213256nvdThird Party AdvisoryWEB
- support.apple.com/kb/HT213257nvdThird Party AdvisoryWEB
- www.debian.org/security/2022/dsa-5103nvdThird Party AdvisoryWEB
- www.openssl.org/news/secadv/20220315.txtnvdVendor AdvisoryWEB
- www.oracle.com/security-alerts/cpuapr2022.htmlnvdThird Party AdvisoryWEB
- www.oracle.com/security-alerts/cpujul2022.htmlnvdThird Party AdvisoryWEB
- www.tenable.com/security/tns-2022-06nvdThird Party AdvisoryWEB
- www.tenable.com/security/tns-2022-07nvdThird Party AdvisoryWEB
- www.tenable.com/security/tns-2022-08nvdThird Party AdvisoryWEB
- www.tenable.com/security/tns-2022-09nvdThird Party AdvisoryWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMGghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMGghsaWEB
- rustsec.org/advisories/RUSTSEC-2022-0014.htmlghsaWEB
- security.netapp.com/advisory/ntap-20220321-0002ghsaWEB
- security.netapp.com/advisory/ntap-20220429-0005ghsaWEB
- security.netapp.com/advisory/ntap-20240621-0006ghsaWEB
- cert-portal.siemens.com/productcert/html/ssa-019200.htmlnvd
- cert-portal.siemens.com/productcert/html/ssa-028723.htmlnvd
- cert-portal.siemens.com/productcert/html/ssa-108696.htmlnvd
- cert-portal.siemens.com/productcert/html/ssa-398330.htmlnvd
- cert-portal.siemens.com/productcert/html/ssa-712929.htmlnvd
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/nvd
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/nvd
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/nvd
- security.netapp.com/advisory/ntap-20240621-0006/nvd
News mentions
1- Siemens SCALANCECISA Alerts