{"id":"JLSEC-2026-228","summary":"The c_rehash script does not properly sanitise shell metacharacters to prevent command injection....","details":"The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).","modified":"2026-04-27T19:02:42.974686397Z","published":"2026-04-27T18:33:55.942Z","upstream":["CVE-2022-1292","EUVD-2022-24621","GHSA-qjmp-vmxc-7p8r"],"database_specific":{"license":"CC-BY-4.0","sources":[{"database_specific":{"status":"Modified"},"id":"CVE-2022-1292","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1292","imported":"2026-04-27T16:32:33.739Z","modified":"2025-08-13T14:15:28.717Z","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-1292","published":"2022-05-03T16:15:18.823Z"},{"id":"GHSA-qjmp-vmxc-7p8r","html_url":"https://github.com/advisories/GHSA-qjmp-vmxc-7p8r","imported":"2026-04-27T16:35:57.961Z","modified":"2025-08-13T15:31:33Z","url":"https://api.github.com/advisories/GHSA-qjmp-vmxc-7p8r","published":"2022-05-04T00:00:23Z"},{"id":"EUVD-2022-24621","html_url":"https://euvd.enisa.europa.eu/vulnerability/EUVD-2022-24621","imported":"2026-04-27T16:33:09.377Z","modified":"2025-12-30T04:55:25Z","url":"https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2022-24621","published":"2022-05-03T15:15:19Z"}]},"references":[{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf"},{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2"},{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=548d3f280a6e737673f5b61fce24bb100108dfeb"},{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23"},{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2"},{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb"},{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23"},{"type":"WEB","url":"https://github.com/advisories/GHSA-qjmp-vmxc-7p8r"},{"type":"WEB","url":"https://gitlab.com/fraf0/cve-2022-1292-re_score-analysis"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNU5M7BXMML26G3GPYKFGQYPQDRSNKDD"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNU5M7BXMML26G3GPYKFGQYPQDRSNKDD/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNU5M7BXMML26G3GPYKFGQYPQDRSNKDD"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1292"},{"type":"WEB","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0011"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202210-02"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220602-0009"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220602-0009/"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220729-0004"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220729-0004/"},{"type":"WEB","url":"https://www.debian.org/security/2022/dsa-5139"},{"type":"WEB","url":"https://www.openssl.org/news/secadv/20220503.txt"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"affected":[{"package":{"name":"OpenSSL_jll","ecosystem":"Julia","purl":"pkg:julia/OpenSSL_jll?uuid=458c3c95-2e84-50aa-8efc-19380b2a3a95"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.1.16+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-228.json"}},{"package":{"name":"Openresty_jll","ecosystem":"Julia","purl":"pkg:julia/Openresty_jll?uuid=87da34d4-7b1b-5a94-8376-8cb65bf3132c"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.21.4+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-228.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}