Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-2068

Опубликовано: 21 июн. 2022
Источник: ubuntu
Приоритет: medium
CVSS2: 10
CVSS3: 9.8

Описание

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

РелизСтатусПримечание
bionic

not-affected

devel

not-affected

esm-apps/bionic

not-affected

esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

focal

not-affected

impish

not-affected

jammy

not-affected

kinetic

not-affected

Показывать по

РелизСтатусПримечание
bionic

not-affected

uses system openssl1.0
devel

not-affected

uses system openssl1.1
esm-apps/bionic

not-affected

uses system openssl1.0
esm-apps/focal

not-affected

uses system openssl1.1
esm-apps/jammy

released

12.22.9~dfsg-1ubuntu3.1
esm-apps/noble

not-affected

uses system openssl1.1
esm-apps/xenial

not-affected

uses system openssl
esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl1.1
impish

not-affected

uses system openssl1.1

Показывать по

РелизСтатусПримечание
bionic

released

1.1.1-1ubuntu2.1~18.04.19
devel

not-affected

3.0.4-1ubuntu1
esm-infra-legacy/trusty

not-affected

1.0.1f-1ubuntu2.27+esm10
esm-infra/bionic

not-affected

1.1.1-1ubuntu2.1~18.04.19
esm-infra/focal

not-affected

1.1.1f-1ubuntu2.15
esm-infra/xenial

released

1.0.2g-1ubuntu4.20+esm5
fips-preview/jammy

released

3.0.2-0ubuntu1.5
fips-updates/bionic

released

1.1.1-1ubuntu2.fips.2.1~18.04.20
fips-updates/focal

released

1.1.1f-1ubuntu2.fips.16
fips-updates/jammy

released

3.0.2-0ubuntu1.5

Показывать по

РелизСтатусПримечание
bionic

released

1.0.2n-1ubuntu5.10
devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

1.0.2n-1ubuntu5.10
esm-infra/focal

DNE

focal

DNE

impish

DNE

jammy

DNE

kinetic

DNE

lunar

DNE

Показывать по

10 Critical

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 6.7
redhat
почти 3 года назад

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 9.8
nvd
почти 3 года назад

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 9.8
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 9.8
debian
почти 3 года назад

In addition to the c_rehash shell command injection identified in CVE- ...

suse-cvrf
почти 3 года назад

Security update for openssl

10 Critical

CVSS2

9.8 Critical

CVSS3

Уязвимость CVE-2022-2068