https://www.cve.org/CVERecord?id=CVE-2022-2068
basically the deal here is that if someone can get openssl's c_rehash script to look at a folder they control, they can make a file with a special name that will let them make openssl run an arbitrary command for them. so it runs as whatever user c_rehash runs as.
i dont think pups from woof-ce even run this script by default, maybe some of the projects closer to stock distributions do, i dont have any to check. this doesn't really matter on a system where everything is root anyhow. mainly a problem for certain multi-user machine setups, or if someone hacks your web server or something.
This could be bad if you are affected- but are you actually affected? if nothing is running c_rehash, no. do your own research
fixed in 3.0.5, 1.1.1p, 1.0.2zf