Further work is required to make sure that OpenSSL is not used to secure other applications. A possible mitigation would be to have the c_rehash script require explicit confirmation by the user before executing any commands. Another mitigation would be to require explicit confirmation before allowing untrusted data to be passed to a command. Last but not least, the c_rehash script could be rewritten so that the file names of the certificates being hashed are not passed to the hasher by default.


This blog post discusses the importance of the OpenSSL vulnerability, CVE-2022-2068. This vulnerability allows attackers to use a crafted certificate to impersonate servers and disclose data from other servers and applications. Since this vulnerability is not easily remedied, it is important to take steps in order to make sure that the system is secure. The blog post provides multiple recommendations for mitigating this issue.


[1] Hacker News
A blog post about the "CVE-2022-2068" vulnerability on the OpenSSL library and potential mitigation steps.
The blog post details a number of ways in which the issue could have been mitigated, including requiring explicit confirmation before executing any commands.


Published on: 06/21/2022 15:15:00 UTC
Last modified on: 07/23/2022 04:15:00 UTC