[CLSA-2024:1735121358] openssl: Fix of CVE-2024-4603
Type:
security
Severity:
Moderate
Release date:
2024-12-25 10:09:26 UTC
Description:
- CVE-2024-4603: Check DSA parameters for excessive sizes before validating
Updated packages:
  • openssl-3.0.7-17.el9_2.tuxcare.els5.x86_64.rpm
    sha:fcd953c3f1df66ff3bb52046861137982ada6d3b868b88c93d95c1ae2124fb9b
  • openssl-devel-3.0.7-17.el9_2.tuxcare.els5.i686.rpm
    sha:22edf009890ea69cece01c7b1c48bd800043f33b405f1728e8f9c458b6e3d074
  • openssl-devel-3.0.7-17.el9_2.tuxcare.els5.x86_64.rpm
    sha:f29352e7746ee83e419bdff23eb6668d0c25b6be76aa69797ea2711b070d0c9b
  • openssl-libs-3.0.7-17.el9_2.tuxcare.els5.i686.rpm
    sha:0f5195887fb333135779972c209d69924926ee68f5ff4d79ec54658caf77d89d
  • openssl-libs-3.0.7-17.el9_2.tuxcare.els5.x86_64.rpm
    sha:eb8ddbc9e1b5373164ec14c9658cd6fe0c5b2633f46fa8ea132ec875bda101c7
  • openssl-perl-3.0.7-17.el9_2.tuxcare.els5.x86_64.rpm
    sha:3f6352cd9f69a490c65010b5c5ffe3427f947887ae1a7700a4afc14a456f018f
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.