Описание
Security update for openssl-1_1
This update for openssl-1_1 fixes the following issues:
- CVE-2022-1292: Fixed command injection in c_rehash (bsc#1199166).
Список пакетов
Container caasp/v4/cilium-operator:1.6.6
libopenssl1_1-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
Container caasp/v4/cilium:1.6.6
libopenssl1_1-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
Container caasp/v4/helm-tiller:2.16.12
libopenssl1_1-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
Container suse/sle15:15.1
libopenssl1_1-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
Image SLES15-SP1-CHOST-BYOS-Azure
libopenssl1_1-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
Image SLES15-SP1-CHOST-BYOS-EC2
libopenssl1_1-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
Image SLES15-SP1-CHOST-BYOS-GCE
libopenssl1_1-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production
libopenssl1_1-1.1.0i-150100.14.30.1
libopenssl1_1-32bit-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production
libopenssl1_1-1.1.0i-150100.14.30.1
libopenssl1_1-32bit-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
Image SLES15-SP1-SAPCAL-Azure
libopenssl1_1-1.1.0i-150100.14.30.1
libopenssl1_1-32bit-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
Image SLES15-SP1-SAPCAL-EC2-HVM
libopenssl1_1-1.1.0i-150100.14.30.1
libopenssl1_1-32bit-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
Image SLES15-SP1-SAPCAL-GCE
libopenssl1_1-1.1.0i-150100.14.30.1
libopenssl1_1-32bit-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
SUSE Enterprise Storage 6
libopenssl-1_1-devel-1.1.0i-150100.14.30.1
libopenssl-1_1-devel-32bit-1.1.0i-150100.14.30.1
libopenssl1_1-1.1.0i-150100.14.30.1
libopenssl1_1-32bit-1.1.0i-150100.14.30.1
libopenssl1_1-hmac-1.1.0i-150100.14.30.1
libopenssl1_1-hmac-32bit-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS
libopenssl-1_1-devel-1.1.0i-150100.14.30.1
libopenssl-1_1-devel-32bit-1.1.0i-150100.14.30.1
libopenssl1_1-1.1.0i-150100.14.30.1
libopenssl1_1-32bit-1.1.0i-150100.14.30.1
libopenssl1_1-hmac-1.1.0i-150100.14.30.1
libopenssl1_1-hmac-32bit-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS
libopenssl-1_1-devel-1.1.0i-150100.14.30.1
libopenssl-1_1-devel-32bit-1.1.0i-150100.14.30.1
libopenssl1_1-1.1.0i-150100.14.30.1
libopenssl1_1-32bit-1.1.0i-150100.14.30.1
libopenssl1_1-hmac-1.1.0i-150100.14.30.1
libopenssl1_1-hmac-32bit-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
SUSE Linux Enterprise Server 15 SP1-BCL
libopenssl-1_1-devel-1.1.0i-150100.14.30.1
libopenssl-1_1-devel-32bit-1.1.0i-150100.14.30.1
libopenssl1_1-1.1.0i-150100.14.30.1
libopenssl1_1-32bit-1.1.0i-150100.14.30.1
libopenssl1_1-hmac-1.1.0i-150100.14.30.1
libopenssl1_1-hmac-32bit-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
SUSE Linux Enterprise Server 15 SP1-LTSS
libopenssl-1_1-devel-1.1.0i-150100.14.30.1
libopenssl-1_1-devel-32bit-1.1.0i-150100.14.30.1
libopenssl1_1-1.1.0i-150100.14.30.1
libopenssl1_1-32bit-1.1.0i-150100.14.30.1
libopenssl1_1-hmac-1.1.0i-150100.14.30.1
libopenssl1_1-hmac-32bit-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1
libopenssl-1_1-devel-1.1.0i-150100.14.30.1
libopenssl-1_1-devel-32bit-1.1.0i-150100.14.30.1
libopenssl1_1-1.1.0i-150100.14.30.1
libopenssl1_1-32bit-1.1.0i-150100.14.30.1
libopenssl1_1-hmac-1.1.0i-150100.14.30.1
libopenssl1_1-hmac-32bit-1.1.0i-150100.14.30.1
openssl-1_1-1.1.0i-150100.14.30.1
Ссылки
- Link for SUSE-SU-2022:2068-1
- E-Mail link for SUSE-SU-2022:2068-1
- SUSE Security Ratings
- SUSE Bug 1185637
- SUSE Bug 1199166
- SUSE CVE CVE-2022-1292 page
Описание
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).
Затронутые продукты
Container caasp/v4/cilium-operator:1.6.6:libopenssl1_1-1.1.0i-150100.14.30.1
Container caasp/v4/cilium-operator:1.6.6:openssl-1_1-1.1.0i-150100.14.30.1
Container caasp/v4/cilium:1.6.6:libopenssl1_1-1.1.0i-150100.14.30.1
Container caasp/v4/cilium:1.6.6:openssl-1_1-1.1.0i-150100.14.30.1
Ссылки
- CVE-2022-1292
- SUSE Bug 1199166
- SUSE Bug 1200550
- SUSE Bug 1200650
- SUSE Bug 1200758
- SUSE Bug 1202688
- SUSE Bug 1225628