Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:2179-1

Опубликовано: 24 июн. 2022
Источник: suse-cvrf

Описание

Security update for openssl

This update for openssl fixes the following issues:

  • CVE-2022-2068: Fixed more shell code injection issues in c_rehash. (bsc#1200550)

Список пакетов

Container caasp/v4/cilium-operator:1.6.6
libopenssl1_1-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
Container caasp/v4/cilium:1.6.6
libopenssl1_1-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
Container caasp/v4/helm-tiller:2.16.12
libopenssl1_1-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
Container suse/sle15:15.1
libopenssl1_1-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
Image SLES15-SP1-CHOST-BYOS-Azure
libopenssl1_1-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
Image SLES15-SP1-CHOST-BYOS-EC2
libopenssl1_1-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
Image SLES15-SP1-CHOST-BYOS-GCE
libopenssl1_1-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production
libopenssl1_1-1.1.0i-150100.14.33.1
libopenssl1_1-32bit-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production
libopenssl1_1-1.1.0i-150100.14.33.1
libopenssl1_1-32bit-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
Image SLES15-SP1-SAPCAL-Azure
libopenssl1_1-1.1.0i-150100.14.33.1
libopenssl1_1-32bit-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
Image SLES15-SP1-SAPCAL-EC2-HVM
libopenssl1_1-1.1.0i-150100.14.33.1
libopenssl1_1-32bit-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
Image SLES15-SP1-SAPCAL-GCE
libopenssl1_1-1.1.0i-150100.14.33.1
libopenssl1_1-32bit-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
SUSE Enterprise Storage 6
libopenssl-1_1-devel-1.1.0i-150100.14.33.1
libopenssl-1_1-devel-32bit-1.1.0i-150100.14.33.1
libopenssl1_1-1.1.0i-150100.14.33.1
libopenssl1_1-32bit-1.1.0i-150100.14.33.1
libopenssl1_1-hmac-1.1.0i-150100.14.33.1
libopenssl1_1-hmac-32bit-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS
libopenssl-1_1-devel-1.1.0i-150100.14.33.1
libopenssl-1_1-devel-32bit-1.1.0i-150100.14.33.1
libopenssl1_1-1.1.0i-150100.14.33.1
libopenssl1_1-32bit-1.1.0i-150100.14.33.1
libopenssl1_1-hmac-1.1.0i-150100.14.33.1
libopenssl1_1-hmac-32bit-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS
libopenssl-1_1-devel-1.1.0i-150100.14.33.1
libopenssl-1_1-devel-32bit-1.1.0i-150100.14.33.1
libopenssl1_1-1.1.0i-150100.14.33.1
libopenssl1_1-32bit-1.1.0i-150100.14.33.1
libopenssl1_1-hmac-1.1.0i-150100.14.33.1
libopenssl1_1-hmac-32bit-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
SUSE Linux Enterprise Server 15 SP1-BCL
libopenssl-1_1-devel-1.1.0i-150100.14.33.1
libopenssl-1_1-devel-32bit-1.1.0i-150100.14.33.1
libopenssl1_1-1.1.0i-150100.14.33.1
libopenssl1_1-32bit-1.1.0i-150100.14.33.1
libopenssl1_1-hmac-1.1.0i-150100.14.33.1
libopenssl1_1-hmac-32bit-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
SUSE Linux Enterprise Server 15 SP1-LTSS
libopenssl-1_1-devel-1.1.0i-150100.14.33.1
libopenssl-1_1-devel-32bit-1.1.0i-150100.14.33.1
libopenssl1_1-1.1.0i-150100.14.33.1
libopenssl1_1-32bit-1.1.0i-150100.14.33.1
libopenssl1_1-hmac-1.1.0i-150100.14.33.1
libopenssl1_1-hmac-32bit-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1
libopenssl-1_1-devel-1.1.0i-150100.14.33.1
libopenssl-1_1-devel-32bit-1.1.0i-150100.14.33.1
libopenssl1_1-1.1.0i-150100.14.33.1
libopenssl1_1-32bit-1.1.0i-150100.14.33.1
libopenssl1_1-hmac-1.1.0i-150100.14.33.1
libopenssl1_1-hmac-32bit-1.1.0i-150100.14.33.1
openssl-1_1-1.1.0i-150100.14.33.1

Описание

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).


Затронутые продукты
Container caasp/v4/cilium-operator:1.6.6:libopenssl1_1-1.1.0i-150100.14.33.1
Container caasp/v4/cilium-operator:1.6.6:openssl-1_1-1.1.0i-150100.14.33.1
Container caasp/v4/cilium:1.6.6:libopenssl1_1-1.1.0i-150100.14.33.1
Container caasp/v4/cilium:1.6.6:openssl-1_1-1.1.0i-150100.14.33.1

Ссылки