rhsa-2022_7384
Vulnerability from csaf_redhat
Published
2022-11-02 18:46
Modified
2024-11-06 01:54
Summary
Red Hat Security Advisory: openssl-container security update

Notes

Topic
An update for openssl-container is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. [Updated 03 November 2022] This erratum was previously incorrectly marked as having a security impact of Critical, and it failed to mention all issues addressed in this update. The security impact of this erratum has been changed to Important, and CVE-2022-3786 was added to the CVE list. No changes have been made to the container image content.
Details
The ubi9/openssl image provides provides an openssl command-line tool for using the various functions of the OpenSSL crypto library. Using the OpenSSL tool, you can generate private keys, create certificate signing requests (CSRs), and display certificate information. This updates the ubi9/openssl image in the Red Hat Container Registry. To pull this container image, run one of the following commands: podman pull registry.redhat.io/rhel9/openssl (authenticated) podman pull registry.access.redhat.com/ubi9/openssl (unauthenticated) Security Fix(es): * OpenSSL: X.509 Email Address Buffer Overflow (CVE-2022-3602) * OpenSSL: X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for openssl-container is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 03 November 2022]\nThis erratum was previously incorrectly marked as having a security impact of Critical, and it failed to mention all issues addressed in this update. The security impact of this erratum has been changed to Important, and CVE-2022-3786 was added to the CVE list. No changes have been made to the container image content.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The ubi9/openssl image provides provides an openssl command-line tool for using the various functions of the OpenSSL crypto library. Using the OpenSSL tool, you can generate private keys, create certificate signing requests (CSRs), and display certificate information.\n\nThis updates the ubi9/openssl image in the Red Hat Container Registry.\n\nTo pull this container image, run one of the following commands:\n\n    podman pull registry.redhat.io/rhel9/openssl (authenticated)\n    podman pull registry.access.redhat.com/ubi9/openssl (unauthenticated)\n\nSecurity Fix(es):\n\n* OpenSSL: X.509 Email Address Buffer Overflow (CVE-2022-3602)\n\n* OpenSSL: X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2022:7384",
        "url": "https://access.redhat.com/errata/RHSA-2022:7384"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://catalog.redhat.com/software/containers/search",
        "url": "https://catalog.redhat.com/software/containers/search"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-004",
        "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-004"
      },
      {
        "category": "external",
        "summary": "2134869",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134869"
      },
      {
        "category": "external",
        "summary": "2137723",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137723"
      },
      {
        "category": "external",
        "summary": "2139104",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139104"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7384.json"
      }
    ],
    "title": "Red Hat Security Advisory: openssl-container security update",
    "tracking": {
      "current_release_date": "2024-11-06T01:54:31+00:00",
      "generator": {
        "date": "2024-11-06T01:54:31+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.1.1"
        }
      },
      "id": "RHSA-2022:7384",
      "initial_release_date": "2022-11-02T18:46:46+00:00",
      "revision_history": [
        {
          "date": "2022-11-02T18:46:46+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2022-11-03T13:03:36+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-06T01:54:31+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.0.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
                "product": {
                  "name": "ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
                  "product_id": "ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c?arch=arm64\u0026repository_url=registry.redhat.io/ubi9/openssl\u0026tag=9.0-25"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
                "product": {
                  "name": "rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
                  "product_id": "rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c?arch=arm64\u0026repository_url=registry.redhat.io/rhel9/openssl\u0026tag=9.0-25"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "arm64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x",
                "product": {
                  "name": "ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x",
                  "product_id": "ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050?arch=s390x\u0026repository_url=registry.redhat.io/ubi9/openssl\u0026tag=9.0-25"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x",
                "product": {
                  "name": "rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x",
                  "product_id": "rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050?arch=s390x\u0026repository_url=registry.redhat.io/rhel9/openssl\u0026tag=9.0-25"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
                "product": {
                  "name": "ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
                  "product_id": "ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:oci/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347?arch=ppc64le\u0026repository_url=registry.redhat.io/ubi9/openssl\u0026tag=9.0-25"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
                "product": {
                  "name": "rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
                  "product_id": "rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:oci/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347?arch=ppc64le\u0026repository_url=registry.redhat.io/rhel9/openssl\u0026tag=9.0-25"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
                "product": {
                  "name": "ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
                  "product_id": "ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4?arch=amd64\u0026repository_url=registry.redhat.io/ubi9/openssl\u0026tag=9.0-25"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
                "product": {
                  "name": "rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
                  "product_id": "rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4?arch=amd64\u0026repository_url=registry.redhat.io/rhel9/openssl\u0026tag=9.0-25"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64"
        },
        "product_reference": "rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le"
        },
        "product_reference": "rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64"
        },
        "product_reference": "rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x"
        },
        "product_reference": "rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64"
        },
        "product_reference": "ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le"
        },
        "product_reference": "ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64"
        },
        "product_reference": "ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x"
        },
        "product_reference": "ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "the OpenSSL project"
          ],
          "organization": "Polar Bear",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2022-3602",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "discovery_date": "2022-10-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2137723"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack-based buffer overflow was found in the way OpenSSL processes X.509 certificates with a specially crafted email address field. This issue could cause a server or a client application compiled with OpenSSL to crash when trying to process the malicious certificate.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "OpenSSL: X.509 Email Address Buffer Overflow",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "As per upstream, the most common situation where this can be triggered is when a server requests client authentication after a malicious client connects. A client connecting to a malicious server is also believed to be vulnerable in the same manner. Only OpenSSL versions 3.0.0 to 3.0.6 are vulnerable to this attack.\nThe OpenSSL binaries in Red Hat Enterprise Linux 9 are compiled with Stack Smashing Protection. Also during the build process, the compiler rearranges the variables in a way that the buffer overflow is only able to overwrite the stack canaries, limiting the maximum impact of this flaw to denial of service. Remote code execution may not be possible in such cases.\n\nRed Hat OpenStack Platform 17 does not ship OpenSSL and is not directly affected by the flaw. However, container images which product ship are of RHEL 9 which were affected. RHOSP have fixed this by respining container images through the following errata: https://access.redhat.com/errata/RHBA-2022:7429",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
          "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
          "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
          "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x",
          "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
          "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
          "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
          "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3602"
        },
        {
          "category": "external",
          "summary": "RHBZ#2137723",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137723"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-004",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-004"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3602",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3602",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3602"
        },
        {
          "category": "external",
          "summary": "https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/",
          "url": "https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/"
        },
        {
          "category": "external",
          "summary": "https://www.openssl.org/news/secadv/20221101.txt",
          "url": "https://www.openssl.org/news/secadv/20221101.txt"
        }
      ],
      "release_date": "2022-11-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-02T18:46:46+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
            "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
            "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
            "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x",
            "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
            "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
            "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
            "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7384"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
            "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
            "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
            "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x",
            "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
            "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
            "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
            "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "OpenSSL: X.509 Email Address Buffer Overflow"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "OpenSSL project"
          ],
          "organization": "Polar Bear",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2022-3786",
      "cwe": {
        "id": "CWE-193",
        "name": "Off-by-one Error"
      },
      "discovery_date": "2022-11-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2139104"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack-based buffer overflow was found in the way OpenSSL processes X.509 certificates with a specially crafted email address field. This issue could cause a server or a client application compiled with OpenSSL to crash or possibly execute remote code when trying to process the malicious certificate.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "OpenSSL: X.509 Email Address Variable Length Buffer Overflow",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "As per upstream, the most common situation where this can be triggered is when a server requests client authentication after a malicious client connects. A client connecting to a malicious server is also believed to be vulnerable in the same manner. Only OpenSSL versions 3.0.0 to 3.0.6 are vulnerable to this attack.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
          "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
          "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
          "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x",
          "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
          "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
          "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
          "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-3786"
        },
        {
          "category": "external",
          "summary": "RHBZ#2139104",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139104"
        },
        {
          "category": "external",
          "summary": "RHSB-2022-004",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-004"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3786",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3786",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3786"
        },
        {
          "category": "external",
          "summary": "https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/",
          "url": "https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/"
        },
        {
          "category": "external",
          "summary": "https://www.openssl.org/news/secadv/20221101.txt",
          "url": "https://www.openssl.org/news/secadv/20221101.txt"
        }
      ],
      "release_date": "2022-11-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2022-11-02T18:46:46+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
            "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
            "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
            "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x",
            "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
            "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
            "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
            "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2022:7384"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
            "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
            "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
            "AppStream-9.0.0.Z.MAIN.EUS:rhel9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x",
            "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:17d66d6147a8ced8665797de2e909ebd98e4ce7c1db9d42e693e88599c5718a4_amd64",
            "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:3c32d03ba29856387d8f238bd2e17c8dc77a04af509df5664fe6c412ebb15347_ppc64le",
            "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a2af1c9744ae5c382121b446efcd673abb67e9fe017f35b06295628dd69c937c_arm64",
            "AppStream-9.0.0.Z.MAIN.EUS:ubi9/openssl@sha256:a33b64e64982f6b9a876ef228abf1b76f553837a46747251cdea4c7576946050_s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "OpenSSL: X.509 Email Address Variable Length Buffer Overflow"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.