ALAS2022-2022-195

Related Vulnerabilities: CVE-2022-2068   CVE-2022-2097  

A flaw was found in OpenSSL. The issue in CVE-2022-1292 did not find other places in the `c_rehash` script where it possibly passed the file names of certificates being hashed to a command executed through the shell. Some operating systems distribute this script in a manner where it is automatically executed. On these operating systems, this flaw allows an attacker to execute arbitrary commands with the privileges of the script. (CVE-2022-2068) AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimized implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. (CVE-2022-2097)

ALAS2022-2022-195


Amazon Linux 2022 Security Advisory: ALAS-2022-195
Advisory Release Date: 2022-11-01 21:24 Pacific
Advisory Updated Date: 2022-11-03 20:57 Pacific
Severity: Medium

Issue Overview:

A flaw was found in OpenSSL. The issue in CVE-2022-1292 did not find other places in the `c_rehash` script where it possibly passed the file names of certificates being hashed to a command executed through the shell. Some operating systems distribute this script in a manner where it is automatically executed. On these operating systems, this flaw allows an attacker to execute arbitrary commands with the privileges of the script. (CVE-2022-2068)

AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimized implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. (CVE-2022-2097)


Affected Packages:

openssl


Issue Correction:
Run dnf update openssl --releasever=2022.0.20221102 to update your system.

New Packages:
aarch64:
    openssl-debuginfo-3.0.5-1.amzn2022.0.2.aarch64
    openssl-libs-debuginfo-3.0.5-1.amzn2022.0.2.aarch64
    openssl-perl-3.0.5-1.amzn2022.0.2.aarch64
    openssl-libs-3.0.5-1.amzn2022.0.2.aarch64
    openssl-3.0.5-1.amzn2022.0.2.aarch64
    openssl-debugsource-3.0.5-1.amzn2022.0.2.aarch64
    openssl-devel-3.0.5-1.amzn2022.0.2.aarch64

i686:
    openssl-libs-3.0.5-1.amzn2022.0.2.i686
    openssl-libs-debuginfo-3.0.5-1.amzn2022.0.2.i686
    openssl-debugsource-3.0.5-1.amzn2022.0.2.i686
    openssl-devel-3.0.5-1.amzn2022.0.2.i686
    openssl-debuginfo-3.0.5-1.amzn2022.0.2.i686
    openssl-3.0.5-1.amzn2022.0.2.i686
    openssl-perl-3.0.5-1.amzn2022.0.2.i686

src:
    openssl-3.0.5-1.amzn2022.0.2.src

x86_64:
    openssl-libs-debuginfo-3.0.5-1.amzn2022.0.2.x86_64
    openssl-perl-3.0.5-1.amzn2022.0.2.x86_64
    openssl-debuginfo-3.0.5-1.amzn2022.0.2.x86_64
    openssl-libs-3.0.5-1.amzn2022.0.2.x86_64
    openssl-3.0.5-1.amzn2022.0.2.x86_64
    openssl-debugsource-3.0.5-1.amzn2022.0.2.x86_64
    openssl-devel-3.0.5-1.amzn2022.0.2.x86_64