Fedora Linux 8783 Published by

An openssl security update has been released for Fedora 36.



SECURITY: Fedora 36 Update: openssl-3.0.5-2.fc36


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-502f096dce
2022-11-02 01:49:43.890850
--------------------------------------------------------------------------------

Name : openssl
Product : Fedora 36
Version : 3.0.5
Release : 2.fc36
URL :   http://www.openssl.org/
Summary : Utilities from the general purpose cryptography library with TLS implementation
Description :
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and
protocols.

--------------------------------------------------------------------------------
Update Information:

Security fix for CVE-2022-3602 and CVE-2022-3786
--------------------------------------------------------------------------------
ChangeLog:

* Tue Nov 1 2022 Dmitry Belyavskiy - 1:3.0.5-2
- CVE-2022-3602: X.509 Email Address Buffer Overflow
- CVE-2022-3786: X.509 Email Address Buffer Overflow
Resolves: CVE-2022-3602
Resolves: CVE-2022-3786
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2137723 - CVE-2022-3602 OpenSSL: X.509 Email Address Buffer Overflow
  https://bugzilla.redhat.com/show_bug.cgi?id=2137723
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-502f096dce' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________