First published: Tue May 03 2022(Updated: )
A flaw was found in OpenSSL. The `c_rehash` script does not properly sanitize shell meta-characters to prevent command injection. Some operating systems distribute this script in a manner where it is automatically executed. This flaw allows an attacker to execute arbitrary commands with the privileges of the script on these operating systems.
Credit: openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-openssl | <1:1.1.1k-13.el8 | 1:1.1.1k-13.el8 |
redhat/jbcs-httpd24-openssl | <1:1.1.1k-13.el7 | 1:1.1.1k-13.el7 |
redhat/openssl | <1:1.1.1k-7.el8_6 | 1:1.1.1k-7.el8_6 |
redhat/openssl | <1:3.0.1-41.el9_0 | 1:3.0.1-41.el9_0 |
redhat/jws5-tomcat-native | <0:1.2.31-11.redhat_11.el7 | 0:1.2.31-11.redhat_11.el7 |
redhat/jws5-tomcat-native | <0:1.2.31-11.redhat_11.el8 | 0:1.2.31-11.redhat_11.el8 |
redhat/jws5-tomcat-native | <0:1.2.31-11.redhat_11.el9 | 0:1.2.31-11.redhat_11.el9 |
redhat/openssl | <1.0.2 | 1.0.2 |
redhat/openssl | <1.1.1 | 1.1.1 |
redhat/openssl | <3.0.3 | 3.0.3 |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 3.0.15-1~deb12u1 3.0.14-1~deb12u2 3.4.1-1 | |
OpenSSL libcrypto | >=1.0.2<1.0.2ze | |
OpenSSL libcrypto | >=1.1.1<1.1.1o | |
OpenSSL libcrypto | >=3.0.0<3.0.3 | |
Debian | =9.0 | |
Debian | =10.0 | |
Debian | =11.0 | |
NetApp Active IQ Unified Manager for VMware vSphere | ||
NetApp Active IQ Unified Manager | ||
NetApp Active IQ Unified Manager | ||
IBM Data ONTAP | ||
NetApp ONTAP Antivirus Connector | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
NetApp SANtricity SMI-S Provider Firmware | ||
NetApp SMI-S Provider | ||
NetApp SnapCenter | ||
NetApp SnapManager for Hyper-V | ||
NetApp SolidFire Enterprise SDS | ||
NetApp SolidFire & HCI Management Node | ||
All of | ||
NetApp AFF A700s Firmware | ||
NetApp A700s | ||
All of | ||
NetApp H300S Firmware | ||
NetApp H300S | ||
All of | ||
NetApp H500S Firmware | ||
NetApp H500s | ||
All of | ||
NetApp H700S | ||
NetApp H700S | ||
All of | ||
NetApp H300E Firmware | ||
NetApp H300E Firmware | ||
All of | ||
NetApp H500E | ||
NetApp H500E | ||
All of | ||
NetApp H700E | ||
NetApp H700E | ||
All of | ||
NetApp H410S Firmware | ||
NetApp H410S Firmware | ||
All of | ||
NetApp AFF 8300 Firmware | ||
NetApp AFF 8300 | ||
All of | ||
NetApp FAS8300 | ||
NetApp FAS8300 | ||
All of | ||
NetApp AFF 8700 | ||
NetApp AFF 8700 | ||
All of | ||
NetApp FAS8700 Firmware | ||
NetApp FAS8700 | ||
All of | ||
NetApp AFF A400 | ||
NetApp AFF A400 | ||
All of | ||
NetApp Fabric-Attached Storage A400 Firmware | ||
NetApp Fabric-Attached Storage A400 | ||
All of | ||
NetApp A250 Firmware | ||
NetApp A250 Firmware | ||
All of | ||
NetApp AFF 500F Firmware | ||
NetApp AFF 500F Firmware | ||
All of | ||
NetApp FAS 500F Firmware | ||
NetApp FAS 500F | ||
Oracle Enterprise Manager Ops Center | =12.4.0.0 | |
MySQL | >=5.0.0<=5.7.38 | |
MySQL | >=8.0.0<=8.0.29 | |
MySQL Workbench | <=8.0.29 | |
Fedora | =35 | |
Fedora | =36 | |
NetApp AFF A700s Firmware | ||
NetApp A700s | ||
NetApp H300S Firmware | ||
NetApp H300S | ||
NetApp H500S Firmware | ||
NetApp H500s | ||
NetApp H700S | ||
NetApp H700S | ||
NetApp H300E Firmware | ||
NetApp H300E Firmware | ||
NetApp H500E | ||
NetApp H500E | ||
NetApp H700E | ||
NetApp H700E | ||
NetApp H410S Firmware | ||
NetApp H410S Firmware | ||
NetApp AFF 8300 Firmware | ||
NetApp AFF 8300 | ||
NetApp FAS8300 | ||
NetApp FAS8300 | ||
NetApp AFF 8700 | ||
NetApp AFF 8700 | ||
NetApp FAS8700 Firmware | ||
NetApp FAS8700 | ||
NetApp AFF A400 | ||
NetApp AFF A400 | ||
NetApp Fabric-Attached Storage A400 Firmware | ||
NetApp Fabric-Attached Storage A400 | ||
NetApp A250 Firmware | ||
NetApp A250 Firmware | ||
NetApp AFF 500F Firmware | ||
NetApp AFF 500F Firmware | ||
NetApp FAS 500F Firmware | ||
NetApp FAS 500F |
As mentioned in the upstream security advisory, use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-1292 has been classified as a critical severity vulnerability.
To fix CVE-2022-1292, upgrade to a patched version of the affected software as listed in the remediation section.
CVE-2022-1292 affects OpenSSL versions prior to 1.1.1k-13.el8, 1.1.1k-13.el7, and certain earlier versions of 1.1.1.
There is no effective workaround for CVE-2022-1292; applying the required updates is the only solution.
CVE-2022-1292 exposes systems to command injection attacks allowing attackers to execute arbitrary commands.