Lucene search

K
slackwareSlackware Linux ProjectSSA-2022-179-03
HistoryJun 28, 2022 - 7:28 p.m.

[slackware-security] Slackware 14.2 openssl

2022-06-2819:28:45
Slackware Linux Project
www.slackware.com
82

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.106 Low

EPSS

Percentile

95.0%

New openssl packages are available for Slackware 14.2 to fix a security issue.

Here are the details from the Slackware 14.2 ChangeLog:

patches/packages/openssl-1.0.2u-i586-4_slack14.2.txz: Rebuilt.
We’re sending out the Slackware 14.2 updates again because the package
build number wasn’t incremented which caused slackpkg to not pick up the
updates. It’s been bumped and the packages rebuilt - otherwise there are
no new changes. Thanks to John Jenkins for the report.
For reference, here’s the information from the previous advisory:
In addition to the c_rehash shell command injection identified in
CVE-2022-1292, further circumstances where the c_rehash script does not
properly sanitise shell metacharacters to prevent command injection were
found by code review.
When the CVE-2022-1292 was fixed it was not discovered that there
are other places in the script where the file names of certificates
being hashed were possibly passed to a command executed through the shell.
For more information, see:
https://www.openssl.org/news/secadv/20220621.txt
https://vulners.com/cve/CVE-2022-2068
(* Security fix *)
patches/packages/openssl-solibs-1.0.2u-i586-4_slack14.2.txz: Rebuilt.

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/openssl-1.0.2u-i586-4_slack14.2.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/openssl-solibs-1.0.2u-i586-4_slack14.2.txz

Updated packages for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/openssl-1.0.2u-x86_64-4_slack14.2.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/openssl-solibs-1.0.2u-x86_64-4_slack14.2.txz

MD5 signatures:

Slackware 14.2 packages:
7771d4ead202b26b87cdfc3fd4ae0c69 openssl-1.0.2u-i586-4_slack14.2.txz
2e427340e78c781abd7c87fca8680c87 openssl-solibs-1.0.2u-i586-4_slack14.2.txz

Slackware x86_64 14.2 packages:
e5b88e618fb734571da397259e1e9118 openssl-1.0.2u-x86_64-4_slack14.2.txz
44c2542fd36c3e87000c18ab8883dd53 openssl-solibs-1.0.2u-x86_64-4_slack14.2.txz

Installation instructions:

Upgrade the packages as root:
> upgradepkg openssl-1.0.2u-i586-4_slack14.2.txz openssl-solibs-1.0.2u-i586-4_slack14.2.txz

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.106 Low

EPSS

Percentile

95.0%