DSA-5169-1 openssl -- security update

Related Vulnerabilities: CVE-2022-2068  

It was discovered that the c_rehash script included in OpenSSL did not sanitise shell meta characters which could result in the execution of arbitrary commands. For the oldstable distribution (buster), this problem has been fixed in version 1.1.1n-0+deb10u3. For the stable distribution (bullseye), this problem has been fixed in version 1.1.1n-0+deb11u3. We recommend that you upgrade your openssl packages. For the detailed security status of openssl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openssl

Debian Security Advisory

DSA-5169-1 openssl -- security update

Date Reported:
26 Jun 2022
Affected Packages:
openssl
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2022-2068.
More information:

It was discovered that the c_rehash script included in OpenSSL did not sanitise shell meta characters which could result in the execution of arbitrary commands.

For the oldstable distribution (buster), this problem has been fixed in version 1.1.1n-0+deb10u3.

For the stable distribution (bullseye), this problem has been fixed in version 1.1.1n-0+deb11u3.

We recommend that you upgrade your openssl packages.

For the detailed security status of openssl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openssl