[ALAS2-2021-1622] Amazon Linux 2 2017.12 - ALAS2-2021-1622: important priority package update for openssl11
Package updates are available for Amazon Linux 2 that fix the following vulnerabilities:
CVE-2021-3450:
A flaw was found in openssl. The flag that enables additional security checks of certificates present in a certificate chain was not enabled allowing a confirmation step to verify that certificates in the chain are valid CA certificates is bypassed. The highest threat from this vulnerability is to data confidentiality and integrity.
1941547: CVE-2021-3450 openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT
CVE-2021-3449:
A flaw was found in openssl. A server crash and denial of service attack could occur if a client sends a TLSv1.2 renegotiation ClientHello and omits the signature_algorithms extension but includes a signature_algorithms_cert extension. The highest threat from this vulnerability is to system availability.
1941554: CVE-2021-3449 openssl: NULL pointer deref in signature_algorithms processing
- ID
- ALAS2-2021-1622
- Severity
- important
- URL
- https://alas.aws.amazon.com/AL2/ALAS-2021-1622.html
- Published
-
2021-03-25T18:31:00
(3 years ago) - Modified
-
2021-03-25T20:52:00
(3 years ago) - Rights
- Amazon Linux Security Team
- Other Advisories
-
- ALAS2-2024-2502
- ALPINE:CVE-2021-3449
- ALPINE:CVE-2021-3450
- ALSA-2021:1024
- ASA-202103-10
- CISCO-SA-OPENSSL-2021-GHY28DJD
- DSA-4875-1
- ELSA-2021-1024
- ELSA-2021-9151
- FEDORA-2021-cbf14ab8f9
- FREEBSD:38A4A043-E937-11EB-9B84-D4C9EF517024
- FREEBSD:56BA4513-A1BE-11EB-9072-D4C9EF517024
- FREEBSD:5A668AB3-8D86-11EB-B8D6-D4C9EF517024
- FREEBSD:C0C1834C-9761-11EB-ACFD-0022489AD614
- GLSA-202103-03
- MS:CVE-2021-3449
- MS:CVE-2021-3450
- openSUSE-SU-2021:0476-1
- openSUSE-SU-2021:1059-1
- openSUSE-SU-2021:1061-1
- openSUSE-SU-2021:2327-1
- openSUSE-SU-2021:2353-1
- RHSA-2021:1024
- RUSTSEC-2021-0055
- RUSTSEC-2021-0056
- SECADV-20210325-1
- SECADV-20210325-2
- SUSE-SU-2021:0954-1
- SUSE-SU-2021:0955-1
- SUSE-SU-2021:0955-2
- SUSE-SU-2021:2323-1
- SUSE-SU-2021:2326-1
- SUSE-SU-2021:2327-1
- SUSE-SU-2021:2353-1
- USN-4891-1
- USN-5038-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2021-3449 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449 | |
CVE | CVE-2021-3450 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3450 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/openssl11?arch=x86_64&distro=amazonlinux-2 | amazonlinux | openssl11 | < 1.1.1g-12.amzn2.0.3 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/openssl11?arch=i686&distro=amazonlinux-2 | amazonlinux | openssl11 | < 1.1.1g-12.amzn2.0.3 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/openssl11?arch=aarch64&distro=amazonlinux-2 | amazonlinux | openssl11 | < 1.1.1g-12.amzn2.0.3 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/openssl11-static?arch=x86_64&distro=amazonlinux-2 | amazonlinux | openssl11-static | < 1.1.1g-12.amzn2.0.3 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/openssl11-static?arch=i686&distro=amazonlinux-2 | amazonlinux | openssl11-static | < 1.1.1g-12.amzn2.0.3 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/openssl11-static?arch=aarch64&distro=amazonlinux-2 | amazonlinux | openssl11-static | < 1.1.1g-12.amzn2.0.3 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/openssl11-libs?arch=x86_64&distro=amazonlinux-2 | amazonlinux | openssl11-libs | < 1.1.1g-12.amzn2.0.3 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/openssl11-libs?arch=i686&distro=amazonlinux-2 | amazonlinux | openssl11-libs | < 1.1.1g-12.amzn2.0.3 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/openssl11-libs?arch=aarch64&distro=amazonlinux-2 | amazonlinux | openssl11-libs | < 1.1.1g-12.amzn2.0.3 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/openssl11-devel?arch=x86_64&distro=amazonlinux-2 | amazonlinux | openssl11-devel | < 1.1.1g-12.amzn2.0.3 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/openssl11-devel?arch=i686&distro=amazonlinux-2 | amazonlinux | openssl11-devel | < 1.1.1g-12.amzn2.0.3 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/openssl11-devel?arch=aarch64&distro=amazonlinux-2 | amazonlinux | openssl11-devel | < 1.1.1g-12.amzn2.0.3 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/openssl11-debuginfo?arch=x86_64&distro=amazonlinux-2 | amazonlinux | openssl11-debuginfo | < 1.1.1g-12.amzn2.0.3 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/openssl11-debuginfo?arch=i686&distro=amazonlinux-2 | amazonlinux | openssl11-debuginfo | < 1.1.1g-12.amzn2.0.3 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/openssl11-debuginfo?arch=aarch64&distro=amazonlinux-2 | amazonlinux | openssl11-debuginfo | < 1.1.1g-12.amzn2.0.3 | amazonlinux-2 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |