-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5139-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff May 17, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : openssl CVE ID : CVE-2022-1292 Elison Niven discovered that the c_rehash script included in OpenSSL did not sanitise shell meta characters which could result in the execution of arbitrary commands. For the oldstable distribution (buster), this problem has been fixed in version 1.1.1n-0+deb10u2. For the stable distribution (bullseye), this problem has been fixed in version 1.1.1n-0+deb11u2. We recommend that you upgrade your openssl packages. For the detailed security status of openssl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openssl Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmKD8YIACgkQEMKTtsN8 Tjbf/Q/9EeIjNdesEYJjq1KlyR2YB1xrDqXu62JsgberEXwKjXj1qPLV8yfTqTDr h9lq0Q7GTbE9cOREfD9A0iyY8I4bTPsHUtqQXmFJBcxYX+JBW7WFQrioXa14SWw9 XVBWjIg0JbCxR0paYjZs5PZ7pJGqkFfbf1atsVyjM+qfkUZ0N8G70qdhIdUA71dH gCOPdG4NbbuQlEs+mSwjos4WlAtKw6E/OzY7wd/5DvLfQgRJNCHRKDBczzn60UPm X2dOLOkNgZgH67cdHDnKwJGQ2XwQ0mjFmgsGuHe4KEh+ZOFDunCeeVaQP0sZuf0d Hsduvqb3VAJcpbR6h+JvwTqgwDikvHk3mjbqOT38mRvzQuwiJq+vTyWJPrFqTjIL lWuPmFGmQ3JrYwAs4/XtJGgDuDsmVFBesyWoHOsbORSvsdilc3PLDAAFln5Gq6Fc u2v1IK4JHugncR137Vf9h3C+voG3d5VpGP27ffAH/BrfAZ3mfMDAV70fSDXWAGgw M+zm0Cc+JdDNyS5jaM+hKuMl4SGf4xlGc8eabNGRvz9ONJ3Dve4sL93OlTrSMhMz Sg3NcdX5RaZ030w8KH9yGhI9HZZaOaJ5a7TZ8+jYTF1mIza3N3X86Vk9dBBdWAv9 xIowwsw+u2Hv4lb1Lt+lDIHewG8dCmWVbv99AgBt7omXZz1REJs= =8cyP -----END PGP SIGNATURE-----