<div dir="ltr">Subject: CVE-2022-3602 and CVE-2022-3786 Critical OpenSSL 3.0.x security vulnerabilities<br><br>Good day from Singapore,<br><br>I refer to the following posts.<br><br>[1] OpenSSL Gives Heads Up to Critical Vulnerability Disclosure, Check Point Alerts Organizations to Prepare Now<br>Link: <a href="https://blog.checkpoint.com/2022/10/30/openssl-gives-heads-up-to-critical-vulnerability-disclosure-check-point-alerts-organizations-to-prepare-now/">https://blog.checkpoint.com/2022/10/30/openssl-gives-heads-up-to-critical-vulnerability-disclosure-check-point-alerts-organizations-to-prepare-now/</a><br><br>[2] 2022 OpenSSL vulnerability - CVE-2022-3602 - Spooky SSL<br>Link: <a href="https://github.com/NCSC-NL/OpenSSL-2022">https://github.com/NCSC-NL/OpenSSL-2022</a><br><br>[3] VMware Response to CVE-2022-3602 and CVE-2022-3786: vulnerabilities in OpenSSL 3.0.x<br>Link: <a href="https://blogs.vmware.com/security/2022/11/vmware-response-to-cve-2022-3602-and-cve-2022-3786-vulnerabilities-in-openssl-3-0-x.html">https://blogs.vmware.com/security/2022/11/vmware-response-to-cve-2022-3602-and-cve-2022-3786-vulnerabilities-in-openssl-3-0-x.html</a><br><br>I have 2 internet-facing CentOS 7.9 Linux servers in Europe.<br><br>Are the patches available already? How do I patch OpenSSL on my CentOS 7.9 Linux servers?<br><br>Thank you.<br><br>Regards,<br><br>Mr. Turritopsis Dohrnii Teo En Ming<br>Targeted Individual in Singapore<br>Blogs:<br><a href="https://tdtemcerts.blogspot.com">https://tdtemcerts.blogspot.com</a><br><a href="https://tdtemcerts.wordpress.com">https://tdtemcerts.wordpress.com</a><br></div>