File _patchinfo of Package patchinfo.24721

<patchinfo incident="24721">
  <issue tracker="bnc" id="1199166">VUL-0: CVE-2022-1292: openssl,openssl-1_0_0,openssl1,openssl-3,compat-openssl098,openssl-1_1: command injection in c_rehash</issue>
  <issue tracker="bnc" id="1199167">VUL-0: CVE-2022-1343: openssl-3: OCSP_basic_verify may incorrectly verify the response signing certificate</issue> 
  <issue tracker="bnc" id="1199169">VUL-0: CVE-2022-1473: openssl-3:Resource leakage when decoding certificates and keys</issue>
  <issue tracker="bnc" id="1201099">VUL-0: EMBARGOED: CVE-2022-2097: openssl-1_1,openssl-3: AES OCB fails to encrypt some bytes</issue>
  <issue tracker="bnc" id="1199168">VUL-0: CVE-2022-1434: openssl-3: Incorrect MAC key used in the RC4-MD5 ciphersuite</issue>
  <issue tracker="bnc" id="1185637">openssl-1_1 fails to build after 2022-06-01</issue>
  <issue tracker="bnc" id="1200550">VUL-0: CVE-2022-2068: openssl,openssl1,openssl-1_1,openssl-1_0_0: more shell code injection issues in c_rehash</issue>
  <issue tracker="cve" id="2022-2068"/>
  <issue tracker="cve" id="2022-1292"/>
  <issue tracker="cve" id="2022-2097"/>
  <issue tracker="cve" id="2022-1434"/>
  <issue tracker="cve" id="2022-1343"/>
  <issue tracker="cve" id="2022-1473"/>
  <packager>jsikes</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for openssl-3</summary>
  <description>This update for openssl-3 fixes the following issues:

- CVE-2022-2068: Fixed more shell code injection issues in c_rehash. (bsc#1200550)
- CVE-2022-1292: Properly sanitise shell metacharacters in c_rehash script. (bsc#1199166) 
- CVE-2022-1343: Fixed incorrect signature verification in OCSP_basic_verify (bsc#1199167).
- CVE-2022-2097: Fixed partial missing encryption in AES OCB mode (bsc#1201099).
- CVE-2022-1434: Fixed incorrect MAC key used in the RC4-MD5 ciphersuite (bsc#1199168).
- CVE-2022-1473: Fixed resource leakage when decoding certificates and keys (bsc#1199169).
</description>
</patchinfo>
openSUSE Build Service is sponsored by