[RLSA-2022:7288] openssl security update
An update is available for openssl. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full strength general purpose cryptography library.
Security Fix(es):
OpenSSL: X.509 Email Address Buffer Overflow (CVE-2022-3602)
OpenSSL: X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/rockylinux/openssl?arch=x86_64&distro=rockylinux-9.0 | < 3.0.1-43.el9_0 |
pkg:rpm/rockylinux/openssl?arch=aarch64&distro=rockylinux-9.0 | < 3.0.1-43.el9_0 |
pkg:rpm/rockylinux/openssl-perl?arch=x86_64&distro=rockylinux-9.0 | < 3.0.1-43.el9_0 |
pkg:rpm/rockylinux/openssl-perl?arch=aarch64&distro=rockylinux-9.0 | < 3.0.1-43.el9_0 |
pkg:rpm/rockylinux/openssl-libs?arch=x86_64&distro=rockylinux-9.0 | < 3.0.1-43.el9_0 |
pkg:rpm/rockylinux/openssl-libs?arch=aarch64&distro=rockylinux-9.0 | < 3.0.1-43.el9_0 |
pkg:rpm/rockylinux/openssl-devel?arch=x86_64&distro=rockylinux-9.0 | < 3.0.1-43.el9_0 |
pkg:rpm/rockylinux/openssl-devel?arch=aarch64&distro=rockylinux-9.0 | < 3.0.1-43.el9_0 |
- ID
- RLSA-2022:7288
- Severity
- important
- URL
- https://errata.rockylinux.org/RLSA-2022:7288
- Published
-
2022-11-01T18:25:07
(22 months ago) - Modified
-
2023-02-02T13:56:34
(19 months ago) - Rights
- Copyright 2023 Rocky Enterprise Software Foundation
- Other Advisories
-
- ALPINE:CVE-2022-3602
- ALPINE:CVE-2022-3786
- ALSA-2022:7288
- CISCO-SA-OPENSSL-W9SDCC2A
- ELSA-2022-10004
- ELSA-2022-7288
- ELSA-2022-9968
- FEDORA-2022-0f1d2e0537
- FEDORA-2022-502f096dce
- FREEBSD:0844671C-5A09-11ED-856E-D4C9EF517024
- GLSA-202211-01
- GLSA-202405-29
- MS:CVE-2022-3602
- MS:CVE-2022-3786
- RHSA-2022:7288
- RUSTSEC-2022-0064
- RUSTSEC-2022-0065
- SECADV-20221101-1
- SECADV-20221101-2
- SUSE-SU-2022:3843-1
- SUSE-SU-2022:4586-1
- USN-5710-1
- VU:794340
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2022-3602 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3602 | |
CVE | CVE-2022-3786 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3786 | |
Bugzilla | 2137723 | https://bugzilla.redhat.com/show_bug.cgi?id=2137723 | |
Bugzilla | 2139104 | https://bugzilla.redhat.com/show_bug.cgi?id=2139104 | |
Self | RLSA-2022:7288 | https://errata.rockylinux.org/RLSA-2022:7288 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/rockylinux/openssl?arch=x86_64&distro=rockylinux-9.0 | rockylinux | openssl | < 3.0.1-43.el9_0 | rockylinux-9.0 | x86_64 | |
Affected | pkg:rpm/rockylinux/openssl?arch=aarch64&distro=rockylinux-9.0 | rockylinux | openssl | < 3.0.1-43.el9_0 | rockylinux-9.0 | aarch64 | |
Affected | pkg:rpm/rockylinux/openssl-perl?arch=x86_64&distro=rockylinux-9.0 | rockylinux | openssl-perl | < 3.0.1-43.el9_0 | rockylinux-9.0 | x86_64 | |
Affected | pkg:rpm/rockylinux/openssl-perl?arch=aarch64&distro=rockylinux-9.0 | rockylinux | openssl-perl | < 3.0.1-43.el9_0 | rockylinux-9.0 | aarch64 | |
Affected | pkg:rpm/rockylinux/openssl-libs?arch=x86_64&distro=rockylinux-9.0 | rockylinux | openssl-libs | < 3.0.1-43.el9_0 | rockylinux-9.0 | x86_64 | |
Affected | pkg:rpm/rockylinux/openssl-libs?arch=aarch64&distro=rockylinux-9.0 | rockylinux | openssl-libs | < 3.0.1-43.el9_0 | rockylinux-9.0 | aarch64 | |
Affected | pkg:rpm/rockylinux/openssl-devel?arch=x86_64&distro=rockylinux-9.0 | rockylinux | openssl-devel | < 3.0.1-43.el9_0 | rockylinux-9.0 | x86_64 | |
Affected | pkg:rpm/rockylinux/openssl-devel?arch=aarch64&distro=rockylinux-9.0 | rockylinux | openssl-devel | < 3.0.1-43.el9_0 | rockylinux-9.0 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |