[CLSA-2024:1719925589] openssl: Fix of 2 CVEs
Type:
security
Severity:
Critical
Release date:
2024-07-02 13:06:32 UTC
Description:
- CVE-2022-1292: c_rehash: Do not use shell to invoke openssl to prevent command injection - CVE-2022-2068: c_rehash: Fix file operations to prevent command injection - Update expired smime certificates - Add testing using old certificates (sha1) to have both types of certificates (sha1, sha256) checked with S/MIME
Updated packages:
  • openssl-1.0.2k-26.el7_9.tuxcare.els1.x86_64.rpm
    sha:7f66d4f4646a48cf26af75a49ba76037d780455e
  • openssl-devel-1.0.2k-26.el7_9.tuxcare.els1.i686.rpm
    sha:cc9802a636d98781be9c6f33f884e5a749fbf548
  • openssl-devel-1.0.2k-26.el7_9.tuxcare.els1.x86_64.rpm
    sha:6c67a5c9104601eddfa402c055accc5d516c5523
  • openssl-libs-1.0.2k-26.el7_9.tuxcare.els1.i686.rpm
    sha:24a4bf025c9bb221679863f1a7c663f2d2c9fe3a
  • openssl-libs-1.0.2k-26.el7_9.tuxcare.els1.x86_64.rpm
    sha:459882a1f8f407d3f97b4de31e623831b6a2bf3f
  • openssl-perl-1.0.2k-26.el7_9.tuxcare.els1.x86_64.rpm
    sha:9040a5628791e15bb864207a25650ad6adaee0ad
  • openssl-static-1.0.2k-26.el7_9.tuxcare.els1.i686.rpm
    sha:3bb08bb608d35424f6d7c114f99dac942d358096
  • openssl-static-1.0.2k-26.el7_9.tuxcare.els1.x86_64.rpm
    sha:4f5ec557e5c7c5fcada89869de9f5fab20040b94
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.