QID 354102

QID 354102: Amazon Linux Security Advisory for Open Secure Sockets Layer (OpenSSL) : ALAS2022-2022-157

Two issues were found in OpenSSL 3.0. The first being a stack based buffer overflow, which is possible by sending an X.509 certificate with a specially crafted email address field. In the binaries provided in Amazon Linux 2022, this is restricted to overwriting bytes that are not referenced later in code execution (CVE-2022-3602). The second being a buffer overrun which can be triggered in X.509 certificate verification, and is restricted to CA signed certificates or applications continuing to proceed after failed validation (CVE-2022-3786). The potential impact from CVE-2022-3786 as present in Amazon Linux 2022 is to availability.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2022-157 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 354102

    Software Advisories
    Advisory ID Software Component Link
    ALAS-2022-157 URL Logo alas.aws.amazon.com/AL2022/ALAS-2022-157.html