Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-2068
HistoryJun 21, 2022 - 12:00 a.m.

CVE-2022-2068

2022-06-2100:00:00
ubuntu.com
ubuntu.com
62

0.085 Low

EPSS

Percentile

94.4%

In addition to the c_rehash shell command injection identified in
CVE-2022-1292, further circumstances where the c_rehash script does not
properly sanitise shell metacharacters to prevent command injection were
found by code review. When the CVE-2022-1292 was fixed it was not
discovered that there are other places in the script where the file names
of certificates being hashed were possibly passed to a command executed
through the shell. This script is distributed by some operating systems in
a manner where it is automatically executed. On such operating systems, an
attacker could execute arbitrary commands with the privileges of the
script. Use of the c_rehash script is considered obsolete and should be
replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4
(Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected
1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

Notes

Author Note
mdeslaur further issues similar to CVE-2022-1292
OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchedk2< anyUNKNOWN
ubuntu22.04noarchnodejs< 12.22.9~dfsg-1ubuntu3.1UNKNOWN
ubuntu18.04noarchopenssl< 1.1.1-1ubuntu2.1~18.04.19UNKNOWN
ubuntu20.04noarchopenssl< 1.1.1f-1ubuntu2.15UNKNOWN
ubuntu21.10noarchopenssl< 1.1.1l-1ubuntu1.5UNKNOWN
ubuntu22.04noarchopenssl< 3.0.2-0ubuntu1.5UNKNOWN
ubuntu14.04noarchopenssl< anyUNKNOWN
ubuntu16.04noarchopenssl< 1.0.2g-1ubuntu4.20+esm5UNKNOWN
ubuntu18.04noarchopenssl1.0< 1.0.2n-1ubuntu5.10UNKNOWN