First published: Wed Jun 15 2022(Updated: )
A flaw was found in OpenSSL. The issue in CVE-2022-1292 did not find other places in the `c_rehash` script where it possibly passed the file names of certificates being hashed to a command executed through the shell. Some operating systems distribute this script in a manner where it is automatically executed. On these operating systems, this flaw allows an attacker to execute arbitrary commands with the privileges of the script.
Credit: openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-openssl | <1:1.1.1k-13.el8 | 1:1.1.1k-13.el8 |
redhat/jbcs-httpd24-openssl | <1:1.1.1k-13.el7 | 1:1.1.1k-13.el7 |
redhat/openssl | <1:1.1.1k-7.el8_6 | 1:1.1.1k-7.el8_6 |
redhat/openssl | <1:3.0.1-41.el9_0 | 1:3.0.1-41.el9_0 |
redhat/jws5-tomcat-native | <0:1.2.31-11.redhat_11.el7 | 0:1.2.31-11.redhat_11.el7 |
redhat/jws5-tomcat-native | <0:1.2.31-11.redhat_11.el8 | 0:1.2.31-11.redhat_11.el8 |
redhat/jws5-tomcat-native | <0:1.2.31-11.redhat_11.el9 | 0:1.2.31-11.redhat_11.el9 |
redhat/openssl | <1.0.2 | 1.0.2 |
redhat/openssl | <1.1.1 | 1.1.1 |
redhat/openssl | <3.0.4 | 3.0.4 |
OpenSSL OpenSSL | >=1.0.2<1.0.2zf | |
OpenSSL OpenSSL | >=1.1.1<1.1.1p | |
OpenSSL OpenSSL | >=3.0.0<3.0.4 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Siemens Sinec Ins | <1.0 | |
Siemens Sinec Ins | =1.0 | |
Siemens Sinec Ins | =1.0-sp1 | |
Siemens Sinec Ins | =1.0-sp2 | |
Netapp Element Software | ||
Netapp Hci Management Node | ||
Netapp Ontap Antivirus Connector | ||
NetApp ONTAP Select Deploy administration utility | ||
Netapp Santricity Smi-s Provider | ||
Netapp Smi-s Provider | ||
Netapp Snapmanager Hyper-v | ||
Netapp Solidfire | ||
Netapp Bootstrap Os | ||
Netapp Hci Compute Node | ||
Netapp H615c Firmware | ||
Netapp H615c | ||
Netapp H610s Firmware | ||
Netapp H610s | ||
Netapp H610c Firmware | ||
Netapp H610c | ||
Netapp H410c Firmware | ||
Netapp H410c | ||
Netapp H300s Firmware | ||
Netapp H300s | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
Netapp H410s Firmware | ||
Netapp H410s | ||
Netapp Fas 8300 Firmware | ||
Netapp Fas 8300 | ||
Netapp Fas 8700 Firmware | ||
Netapp Fas 8700 | ||
Netapp Fas A400 Firmware | ||
Netapp Fas A400 | ||
Netapp Aff 8300 Firmware | ||
Netapp Aff 8300 | ||
Netapp Aff 8700 Firmware | ||
Netapp Aff 8700 | ||
Netapp Aff A400 Firmware | ||
Netapp Aff A400 | ||
Broadcom Sannav | ||
All of | ||
Netapp Bootstrap Os | ||
Netapp Hci Compute Node | ||
All of | ||
Netapp H615c Firmware | ||
Netapp H615c | ||
All of | ||
Netapp H610s Firmware | ||
Netapp H610s | ||
All of | ||
Netapp H610c Firmware | ||
Netapp H610c | ||
All of | ||
Netapp H410c Firmware | ||
Netapp H410c | ||
All of | ||
Netapp H300s Firmware | ||
Netapp H300s | ||
All of | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
All of | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
All of | ||
Netapp H410s Firmware | ||
Netapp H410s | ||
All of | ||
Netapp Fas 8300 Firmware | ||
Netapp Fas 8300 | ||
All of | ||
Netapp Fas 8700 Firmware | ||
Netapp Fas 8700 | ||
All of | ||
Netapp Fas A400 Firmware | ||
Netapp Fas A400 | ||
All of | ||
Netapp Aff 8300 Firmware | ||
Netapp Aff 8300 | ||
All of | ||
Netapp Aff 8700 Firmware | ||
Netapp Aff 8700 | ||
All of | ||
Netapp Aff A400 Firmware | ||
Netapp Aff A400 | ||
debian/openssl | 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 3.0.15-1~deb12u1 3.0.14-1~deb12u2 3.3.2-2 |
As mentioned in the upstream security advisory, use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command-line tool.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2022-2068.
The severity of CVE-2022-2068 is critical with a severity value of 9.8.
The affected software includes OpenSSL versions 1.0.2 to 1.0.2zf, 1.1.1 to 1.1.1p, and 3.0.0 to 3.0.4, as well as certain packages from Red Hat, Debian, and other sources.
A remote attacker can exploit CVE-2022-2068 by injecting arbitrary commands into the c_rehash script, leading to command injection and potential execution of arbitrary commands on the system.
Yes, there are remediation steps available. Please refer to the provided references for detailed instructions and patches.