QID 354459

Date Published: 2022-12-27

QID 354459: Amazon Linux Security Advisory for Open Secure Sockets Layer (OpenSSL) : ALAS2022-2022-195

A flaw was found in openssl.
The issue in( CVE-2022-1292 did not find other places in the `c_rehash` script where it possibly passed the file names of certificates being hashed to a command executed through the shell.
Some operating systems distribute this script in a manner where it is automatically executed.
On these operating systems, this flaw allows an attacker to execute arbitrary commands with the privileges of the script. (
( CVE-2022-2068) aes ocb mode for 32-bit x86 platforms using the aes-ni assembly optimized implementation will not encrypt the entirety of the data under some circumstances.
This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written.
In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. (
( CVE-2022-2097)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2022-195 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS-2022-195 amazon linux 2022 URL Logo alas.aws.amazon.com/AL2022/ALAS-2022-195.html