what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 5139-1

Debian Security Advisory 5139-1
Posted May 28, 2022
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5139-1 - Elison Niven discovered that the c_rehash script included in OpenSSL did not sanitise shell meta characters which could result in the execution of arbitrary commands.

tags | advisory, arbitrary, shell
systems | linux, debian
advisories | CVE-2022-1292
SHA-256 | ef79c3ca5c1efbccff9dc61bd33193432c830b87ff4fe6b1269b865f1331e44a

Debian Security Advisory 5139-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5139-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
May 17, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openssl
CVE ID : CVE-2022-1292

Elison Niven discovered that the c_rehash script included in OpenSSL did
not sanitise shell meta characters which could result in the execution
of arbitrary commands.

For the oldstable distribution (buster), this problem has been fixed
in version 1.1.1n-0+deb10u2.

For the stable distribution (bullseye), this problem has been fixed in
version 1.1.1n-0+deb11u2.

We recommend that you upgrade your openssl packages.

For the detailed security status of openssl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openssl

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmKD8YIACgkQEMKTtsN8
Tjbf/Q/9EeIjNdesEYJjq1KlyR2YB1xrDqXu62JsgberEXwKjXj1qPLV8yfTqTDr
h9lq0Q7GTbE9cOREfD9A0iyY8I4bTPsHUtqQXmFJBcxYX+JBW7WFQrioXa14SWw9
XVBWjIg0JbCxR0paYjZs5PZ7pJGqkFfbf1atsVyjM+qfkUZ0N8G70qdhIdUA71dH
gCOPdG4NbbuQlEs+mSwjos4WlAtKw6E/OzY7wd/5DvLfQgRJNCHRKDBczzn60UPm
X2dOLOkNgZgH67cdHDnKwJGQ2XwQ0mjFmgsGuHe4KEh+ZOFDunCeeVaQP0sZuf0d
Hsduvqb3VAJcpbR6h+JvwTqgwDikvHk3mjbqOT38mRvzQuwiJq+vTyWJPrFqTjIL
lWuPmFGmQ3JrYwAs4/XtJGgDuDsmVFBesyWoHOsbORSvsdilc3PLDAAFln5Gq6Fc
u2v1IK4JHugncR137Vf9h3C+voG3d5VpGP27ffAH/BrfAZ3mfMDAV70fSDXWAGgw
M+zm0Cc+JdDNyS5jaM+hKuMl4SGf4xlGc8eabNGRvz9ONJ3Dve4sL93OlTrSMhMz
Sg3NcdX5RaZ030w8KH9yGhI9HZZaOaJ5a7TZ8+jYTF1mIza3N3X86Vk9dBBdWAv9
xIowwsw+u2Hv4lb1Lt+lDIHewG8dCmWVbv99AgBt7omXZz1REJs=
=8cyP
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close