Bugzilla – Full Text Bug Listing |
Summary: | VUL-0: CVE-2022-3602,CVE-2022-3786: openssl-3: X.509 Email Address Buffer Overflow | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Marcus Meissner <meissner> |
Component: | Incidents | Assignee: | Security Team bot <security-team> |
Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
Severity: | Critical | ||
Priority: | P1 - Urgent | CC: | abergmann, gabriele.sonnu, gianluca.gabrielli, logan.vance, otto.hollmann, pmonrealgonzalez, rfrohl |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
URL: | https://smash.suse.de/issue/346121/ | ||
Whiteboard: | CVSSv3.1:SUSE:CVE-2022-3602:9.8:(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSSv3.1:SUSE:CVE-2022-3786:8.1:(AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | ||
Found By: | --- | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Attachments: |
0001-Fix-CVE-in-punycode-decoder.patch
0002-punycode-ensure-the-result-is-zero-terminated.patch |
Comment 17
Marcus Meissner
2022-11-01 16:39:14 UTC
SUSE-SU-2022:3843-1: An update that fixes three vulnerabilities is now available. Category: security (critical) Bug References: 1204226,1204714 CVE References: CVE-2022-3358,CVE-2022-3602,CVE-2022-3786 JIRA References: Sources used: openSUSE Leap 15.4 (src): openssl-3-3.0.1-150400.4.11.1 SUSE Linux Enterprise Module for Basesystem 15-SP4 (src): openssl-3-3.0.1-150400.4.11.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. Upstream commits: * https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fe3b639dc19b325846f4f6801f2f4604f56e3de3 * https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a Factory submission: https://build.opensuse.org/request/show/1032748 all done |