Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:2182-1

Опубликовано: 24 июн. 2022
Источник: suse-cvrf

Описание

Security update for openssl-1_1

This update for openssl-1_1 fixes the following issues:

  • CVE-2022-1292: Fixed command injection in c_rehash (bsc#1199166).
  • CVE-2022-2068: Fixed more shell code injection issues in c_rehash. (bsc#1200550)

Список пакетов

Image SLES12-SP5-Azure-BYOS
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-Azure-Basic-On-Demand
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-Azure-HPC-BYOS
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-Azure-HPC-On-Demand
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-Azure-SAP-BYOS
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-Azure-SAP-On-Demand
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-Azure-Standard-On-Demand
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-EC2-BYOS
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-EC2-ECS-On-Demand
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-EC2-On-Demand
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-EC2-SAP-BYOS
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-EC2-SAP-On-Demand
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-GCE-BYOS
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-GCE-On-Demand
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-GCE-SAP-BYOS
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-GCE-SAP-On-Demand
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
libopenssl1_1-1.1.1d-2.66.1
SUSE Linux Enterprise Server 12 SP4-LTSS
libopenssl1_1-1.1.1d-2.66.1
libopenssl1_1-32bit-1.1.1d-2.66.1
libopenssl1_1-hmac-1.1.1d-2.66.1
libopenssl1_1-hmac-32bit-1.1.1d-2.66.1
openssl-1_1-1.1.1d-2.66.1
SUSE Linux Enterprise Server 12 SP5
libopenssl1_1-1.1.1d-2.66.1
libopenssl1_1-32bit-1.1.1d-2.66.1
libopenssl1_1-hmac-1.1.1d-2.66.1
libopenssl1_1-hmac-32bit-1.1.1d-2.66.1
openssl-1_1-1.1.1d-2.66.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4
libopenssl1_1-1.1.1d-2.66.1
libopenssl1_1-32bit-1.1.1d-2.66.1
libopenssl1_1-hmac-1.1.1d-2.66.1
libopenssl1_1-hmac-32bit-1.1.1d-2.66.1
openssl-1_1-1.1.1d-2.66.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
libopenssl1_1-1.1.1d-2.66.1
libopenssl1_1-32bit-1.1.1d-2.66.1
libopenssl1_1-hmac-1.1.1d-2.66.1
libopenssl1_1-hmac-32bit-1.1.1d-2.66.1
openssl-1_1-1.1.1d-2.66.1
SUSE Linux Enterprise Software Development Kit 12 SP5
libopenssl-1_1-devel-1.1.1d-2.66.1
libopenssl-1_1-devel-32bit-1.1.1d-2.66.1
SUSE OpenStack Cloud 9
libopenssl1_1-1.1.1d-2.66.1
libopenssl1_1-32bit-1.1.1d-2.66.1
libopenssl1_1-hmac-1.1.1d-2.66.1
libopenssl1_1-hmac-32bit-1.1.1d-2.66.1
openssl-1_1-1.1.1d-2.66.1
SUSE OpenStack Cloud Crowbar 9
libopenssl1_1-1.1.1d-2.66.1
libopenssl1_1-32bit-1.1.1d-2.66.1
libopenssl1_1-hmac-1.1.1d-2.66.1
libopenssl1_1-hmac-32bit-1.1.1d-2.66.1
openssl-1_1-1.1.1d-2.66.1

Описание

The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-Azure-Basic-On-Demand:libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-Azure-HPC-BYOS:libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-Azure-HPC-On-Demand:libopenssl1_1-1.1.1d-2.66.1

Ссылки

Описание

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).


Затронутые продукты
Image SLES12-SP5-Azure-BYOS:libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-Azure-Basic-On-Demand:libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-Azure-HPC-BYOS:libopenssl1_1-1.1.1d-2.66.1
Image SLES12-SP5-Azure-HPC-On-Demand:libopenssl1_1-1.1.1d-2.66.1

Ссылки
Уязвимость SUSE-SU-2022:2182-1