OSG-SEC-2022-11-02 HIGH OpenSSL buffer overflows
Dear OSG Security Contacts,
Two buffer overflow vulnerabilities were found in the OpenSSL toolkit: X.509 Email Address Buffer Overflow (CVE-2022-3602)  and X.509 Email Address Variable Length Buffer Overflow (CVE-2022-3786) . OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full strength general purpose cryptography library.
OpenSSL 3.0.0 - 3.0.6 (Older versions of OpenSSL are not affected.)
WHAT ARE THE VULNERABILITIES:
The two separate buffer overflow vulnerabilities were discovered in the OpenSSL toolkit. A buffer overrun can be triggered by sending an X.509 certificate with a specially crafted email address field to a vulnerable client or server. This can result in an overflow of four attacker-controlled bytes on the stack. This could result in a crash (causing a denial of service) or possibly result in remote code execution. 
WHAT YOU SHOULD DO:
Several newer releases of Linux distributions include the OpenSSL 3.0 packages: RHEL 9, Ubuntu 22.04, Ubuntu 22.10. Some distributions may also provide the packages as non-standard add-ons like RHEL 8 through EPEL (Extra Packages for Enterprise Linux). You'll want to first establish if any of your Linux systems are impacted. If they are, update their OpenSSL 3.0 packages with the latest available patched versions.
Sites running RHEL should see 
Sites running CentOS should also see 
Sites running Ubuntu should see 
Sites running Scientific Linux should see 
Sites running Debian should see 
Sites running RockyLinux should see 
Sites running Almalinux should see 
Please contact the OSG security team at sec[email protected] if you have any questions or concerns.
OSG Security Team