QID 353093

Date Published: 2021-12-27

QID 353093: Amazon Linux Security Advisory for Open Secure Sockets Layer (OpenSSL) : AL2012-2021-354

Package updates are available for amazon linux that fix the following vulnerabilities:
cve-2021-3712: it was found that openssl assumed asn.1 strings to be nul terminated.
A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-nul terminated string to deliberately hit this bug, which may result in a crash of the application, causing a denial of service attack, or possibly, memory disclosure.
The highest threat from this vulnerability is to data confidentiality and system availability.
1995634: cve-2021-3712 openssl: read buffer overruns processing asn.1 strings

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.

  • CVSS V3 rated as High - 7.4 severity.
  • CVSS V2 rated as Medium - 5.8 severity.
  • Solution
    Administrators are advised to apply the appropriate software updates.
    Vendor References

    CVEs related to QID 353093

    Software Advisories
    Advisory ID Software Component Link
    AL2012-2021-354 Amazon Linux Bare Metal URL Logo docs.aws.amazon.com/AWSEC2/latest/UserGuide/install-updates.html