QID 354404
Date Published: 2022-12-21
QID 354404: Amazon Linux Security Advisory for Open Secure Sockets Layer (OpenSSL) : ALAS2022-2022-157
Two issues were found in openssl 3.0.
The first being a stack based buffer overflow, which is possible by sending an x.509 certificate with a specially crafted email address field.
In the binaries provided in amazon linux 2022, this is restricted to overwriting bytes that are not referenced later in code execution (cve-2022-3602).
The second being a buffer overrun which can be triggered in x.509 certificate verification, and is restricted to ca signed certificates or applications continuing to proceed after failed validation (cve-2022-3786).
The potential impact from( CVE-2022-3786 as present in amazon linux 2022 is to availability.
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2022-2022-157 -
alas.aws.amazon.com/AL2022/ALAS-2022-157.html
CVEs related to QID 354404
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2022-2022-157 | amazon linux 2022 |
|