|
7 | 7 | https://github.com/openssl/openssl/commits/ and pick the appropriate
|
8 | 8 | release branch.
|
9 | 9 |
|
| 10 | + Changes between 1.1.1o and 1.1.1p [21 Jun 2022] |
| 11 | + |
| 12 | + *) In addition to the c_rehash shell command injection identified in |
| 13 | + CVE-2022-1292, further bugs where the c_rehash script does not |
| 14 | + properly sanitise shell metacharacters to prevent command injection have been |
| 15 | + fixed. |
| 16 | + |
| 17 | + When the CVE-2022-1292 was fixed it was not discovered that there |
| 18 | + are other places in the script where the file names of certificates |
| 19 | + being hashed were possibly passed to a command executed through the shell. |
| 20 | + |
| 21 | + This script is distributed by some operating systems in a manner where |
| 22 | + it is automatically executed. On such operating systems, an attacker |
| 23 | + could execute arbitrary commands with the privileges of the script. |
| 24 | + |
| 25 | + Use of the c_rehash script is considered obsolete and should be replaced |
| 26 | + by the OpenSSL rehash command line tool. |
| 27 | + (CVE-2022-2068) |
| 28 | + [Daniel Fiala, Tomáš Mráz] |
| 29 | + |
| 30 | + *) When OpenSSL TLS client is connecting without any supported elliptic |
| 31 | + curves and TLS-1.3 protocol is disabled the connection will no longer fail |
| 32 | + if a ciphersuite that does not use a key exchange based on elliptic |
| 33 | + curves can be negotiated. |
| 34 | + [Tomáš Mráz] |
| 35 | + |
10 | 36 | Changes between 1.1.1n and 1.1.1o [3 May 2022]
|
11 | 37 |
|
12 | 38 | *) Fixed a bug in the c_rehash script which was not properly sanitising shell
|
13 |
| - metacharacters to prevent command injection. This script is distributed by |
14 |
| - some operating systems in a manner where it is automatically executed. On |
15 |
| - such operating systems, an attacker could execute arbitrary commands with the |
16 |
| - privileges of the script. |
17 |
| - |
18 |
| - Use of the c_rehash script is considered obsolete and should be replaced |
19 |
| - by the OpenSSL rehash command line tool. |
20 |
| - (CVE-2022-1292) |
21 |
| - [Tomáš Mráz] |
| 39 | + metacharacters to prevent command injection. This script is distributed |
| 40 | + by some operating systems in a manner where it is automatically executed. |
| 41 | + On such operating systems, an attacker could execute arbitrary commands |
| 42 | + with the privileges of the script. |
| 43 | + |
| 44 | + Use of the c_rehash script is considered obsolete and should be replaced |
| 45 | + by the OpenSSL rehash command line tool. |
| 46 | + (CVE-2022-1292) |
| 47 | + [Tomáš Mráz] |
22 | 48 |
|
23 | 49 | Changes between 1.1.1m and 1.1.1n [15 Mar 2022]
|
24 | 50 |
|
|
0 commit comments