USN-5488-2: OpenSSL vulnerability
6 July 2022
OpenSSL could be made to crash or run programs when the c_rehash script is used.
Releases
Packages
- openssl - Secure Socket Layer (SSL) cryptographic library and tools
Details
USN-5488-1 fixed vulnerabilities in OpenSSL. This update provides the
corresponding updates for Ubuntu 16.04 ESM.
Original advisory details:
Chancen and Daniel Fiala discovered that OpenSSL incorrectly handled the
c_rehash script. A local attacker could possibly use this issue to execute
arbitrary commands when c_rehash is run.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
openssl
-
1.0.2g-1ubuntu4.20+esm5
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5488-1: libssl3, libssl1.0-dev, libssl-doc, openssl1.0, libssl1.0.0, libssl-dev, openssl, libssl1.1
- USN-6457-1: libnode-dev, nodejs, libnode72, nodejs-doc
- USN-7018-1: openssl, libssl1.0.0, libssl-dev, libssl-doc