kumquat-buildroot/package/libopenssl
Fabrice Fontaine 026f35d9e7 package/libopenssl: security bump to version 1.1.1p
The c_rehash script allows command injection (CVE-2022-2068)
============================================================

Severity: Moderate

In addition to the c_rehash shell command injection identified in
CVE-2022-1292, further circumstances where the c_rehash script does not
properly sanitise shell metacharacters to prevent command injection were
found by code review.

When the CVE-2022-1292 was fixed it was not discovered that there
are other places in the script where the file names of certificates
being hashed were possibly passed to a command executed through the
shell.

This script is distributed by some operating systems in a manner where
it is automatically executed.  On such operating systems, an attacker
could execute arbitrary commands with the privileges of the script.

Use of the c_rehash script is considered obsolete and should be replaced
by the OpenSSL rehash command line tool.

https://www.openssl.org/news/secadv/20220621.txt

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
2022-07-04 18:53:11 +02:00
..
0001-Dont-waste-time-building-manpages-if-we-re-not-going.patch
0002-Reproducible-build-do-not-leak-compiler-path.patch
0003-Introduce-the-OPENSSL_NO_MADVISE-to-disable-call-to-.patch
0004-Configure-use-ELFv2-ABI-on-some-ppc64-big-endian-sys.patch
0005-crypto-perlasm-ppc-xlate.pl-add-linux64v2-flavour.patch
0006-Add-support-for-io_pgetevents_time64-syscall.patch
0007-Fixup-support-for-io_pgetevents_time64-syscall.patch
Config.in
libopenssl.hash
libopenssl.mk