QID 354102
QID 354102: Amazon Linux Security Advisory for Open Secure Sockets Layer (OpenSSL) : ALAS2022-2022-157
Two issues were found in OpenSSL 3.0. The first being a stack based buffer overflow, which is possible by sending an X.509 certificate with a specially crafted email address field. In the binaries provided in Amazon Linux 2022, this is restricted to overwriting bytes that are not referenced later in code execution (CVE-2022-3602). The second being a buffer overrun which can be triggered in X.509 certificate verification, and is restricted to CA signed certificates or applications continuing to proceed after failed validation (CVE-2022-3786). The potential impact from CVE-2022-3786 as present in Amazon Linux 2022 is to availability.
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
- ALAS-2022-157 -
alas.aws.amazon.com/AL2022/ALAS-2022-157.html
CVEs related to QID 354102
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS-2022-157 |
|