Amazon Linux 2022 Security Advisory: ALAS-2022-157
Advisory Release Date: 2022-10-27 22:58 Pacific
Advisory Updated Date: 2022-11-01 19:56 Pacific
Two issues were found in OpenSSL 3.0. The first being a stack based buffer overflow, which is possible by sending an X.509 certificate with a specially crafted email address field. In the binaries provided in Amazon Linux 2022, this is restricted to overwriting bytes that are not referenced later in code execution (CVE-2022-3602). The second being a buffer overrun which can be triggered in X.509 certificate verification, and is restricted to CA signed certificates or applications continuing to proceed after failed validation (CVE-2022-3786). The potential impact from CVE-2022-3786 as present in Amazon Linux 2022 is to availability.
Affected Packages:
openssl
Issue Correction:
Run dnf update openssl --releasever=2022.0.20221101 to update your system.
aarch64:
openssl-libs-debuginfo-3.0.5-1.amzn2022.0.3.aarch64
openssl-perl-3.0.5-1.amzn2022.0.3.aarch64
openssl-libs-3.0.5-1.amzn2022.0.3.aarch64
openssl-debuginfo-3.0.5-1.amzn2022.0.3.aarch64
openssl-3.0.5-1.amzn2022.0.3.aarch64
openssl-debugsource-3.0.5-1.amzn2022.0.3.aarch64
openssl-devel-3.0.5-1.amzn2022.0.3.aarch64
src:
openssl-3.0.5-1.amzn2022.0.3.src
x86_64:
openssl-libs-debuginfo-3.0.5-1.amzn2022.0.3.x86_64
openssl-debuginfo-3.0.5-1.amzn2022.0.3.x86_64
openssl-libs-3.0.5-1.amzn2022.0.3.x86_64
openssl-perl-3.0.5-1.amzn2022.0.3.x86_64
openssl-3.0.5-1.amzn2022.0.3.x86_64
openssl-debugsource-3.0.5-1.amzn2022.0.3.x86_64
openssl-devel-3.0.5-1.amzn2022.0.3.x86_64