Количество 22
Количество 22

CVE-2022-2068
In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVE-2022-2068
In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVE-2022-2068
In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVE-2022-2068
CVE-2022-2068
In addition to the c_rehash shell command injection identified in CVE- ...

SUSE-SU-2022:2181-1
Security update for openssl

SUSE-SU-2022:2180-1
Security update for openssl

SUSE-SU-2022:2179-1
Security update for openssl
GHSA-xjxr-x4h8-946x
In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

BDU:2022-04039
Уязвимость функции модульного возведения в степень Монтгомери с постоянным временем библиотек OpenSSL и BoringSSL, позволяющая нарушителю выполнить произвольный код

SUSE-SU-2022:2321-1
Security update for openssl-1_0_0

SUSE-SU-2022:2309-1
Security update for openssl

SUSE-SU-2022:2251-1
Security update for openssl-1_1

SUSE-SU-2022:2197-1
Security update for openssl-1_0_0

SUSE-SU-2022:2182-1
Security update for openssl-1_1

SUSE-SU-2022:2308-1
Security update for openssl-1_1

RLSA-2022:5818
Moderate: openssl security update
ELSA-2022-9683
ELSA-2022-9683: openssl security update (MODERATE)
ELSA-2022-5818
ELSA-2022-5818: openssl security update (MODERATE)
ELSA-2022-9751
ELSA-2022-9751: openssl security update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2022-2068 In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze). | CVSS3: 9.8 | 71% Высокий | почти 3 года назад |
![]() | CVE-2022-2068 In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze). | CVSS3: 6.7 | 71% Высокий | почти 3 года назад |
![]() | CVE-2022-2068 In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze). | CVSS3: 9.8 | 71% Высокий | почти 3 года назад |
![]() | CVSS3: 9.8 | 71% Высокий | почти 3 года назад | |
CVE-2022-2068 In addition to the c_rehash shell command injection identified in CVE- ... | CVSS3: 9.8 | 71% Высокий | почти 3 года назад | |
![]() | SUSE-SU-2022:2181-1 Security update for openssl | 71% Высокий | почти 3 года назад | |
![]() | SUSE-SU-2022:2180-1 Security update for openssl | 71% Высокий | почти 3 года назад | |
![]() | SUSE-SU-2022:2179-1 Security update for openssl | 71% Высокий | почти 3 года назад | |
GHSA-xjxr-x4h8-946x In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze). | CVSS3: 9.8 | 71% Высокий | почти 3 года назад | |
![]() | BDU:2022-04039 Уязвимость функции модульного возведения в степень Монтгомери с постоянным временем библиотек OpenSSL и BoringSSL, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 71% Высокий | почти 3 года назад |
![]() | SUSE-SU-2022:2321-1 Security update for openssl-1_0_0 | почти 3 года назад | ||
![]() | SUSE-SU-2022:2309-1 Security update for openssl | почти 3 года назад | ||
![]() | SUSE-SU-2022:2251-1 Security update for openssl-1_1 | почти 3 года назад | ||
![]() | SUSE-SU-2022:2197-1 Security update for openssl-1_0_0 | почти 3 года назад | ||
![]() | SUSE-SU-2022:2182-1 Security update for openssl-1_1 | почти 3 года назад | ||
![]() | SUSE-SU-2022:2308-1 Security update for openssl-1_1 | почти 3 года назад | ||
![]() | RLSA-2022:5818 Moderate: openssl security update | почти 3 года назад | ||
ELSA-2022-9683 ELSA-2022-9683: openssl security update (MODERATE) | почти 3 года назад | |||
ELSA-2022-5818 ELSA-2022-5818: openssl security update (MODERATE) | почти 3 года назад | |||
ELSA-2022-9751 ELSA-2022-9751: openssl security update (MODERATE) | почти 3 года назад |
Уязвимостей на страницу