Security update for openssl-3
SUSE Security Update: Security update for openssl-3Announcement ID: | SUSE-SU-2022:3843-1 |
Rating: | critical |
References: | #1204226 #1204714 |
Cross-References: | CVE-2022-3358 CVE-2022-3602 CVE-2022-3786 |
Affected Products: |
|
An update that fixes three vulnerabilities is now available.
Description:
This update for openssl-3 fixes the following issues:
- CVE-2022-3358: Fixed vulnerability where a custom cipher passed to EVP_CipherInit() could lead into NULL encryption being unexpectedly used (bsc#1204226).
- CVE-2022-3602: Fixed a buffer overflow in the X.509 email address. (bsc#1204714)
- CVE-2022-3786: Fixed another buffer overflow related to X.509 email address. (bsc#1204714)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-3843=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3843=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
- libopenssl-3-devel-3.0.1-150400.4.11.1
- libopenssl3-3.0.1-150400.4.11.1
- libopenssl3-debuginfo-3.0.1-150400.4.11.1
- openssl-3-3.0.1-150400.4.11.1
- openssl-3-debuginfo-3.0.1-150400.4.11.1
- openssl-3-debugsource-3.0.1-150400.4.11.1
- openSUSE Leap 15.4 (x86_64):
- libopenssl-3-devel-32bit-3.0.1-150400.4.11.1
- libopenssl3-32bit-3.0.1-150400.4.11.1
- libopenssl3-32bit-debuginfo-3.0.1-150400.4.11.1
- openSUSE Leap 15.4 (noarch):
- openssl-3-doc-3.0.1-150400.4.11.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
- libopenssl-3-devel-3.0.1-150400.4.11.1
- libopenssl3-3.0.1-150400.4.11.1
- libopenssl3-debuginfo-3.0.1-150400.4.11.1
- openssl-3-3.0.1-150400.4.11.1
- openssl-3-debuginfo-3.0.1-150400.4.11.1
- openssl-3-debugsource-3.0.1-150400.4.11.1