Release date:
2024-07-02 13:06:32 UTC
Description:
- CVE-2022-1292: c_rehash: Do not use shell to invoke openssl to prevent
command injection
- CVE-2022-2068: c_rehash: Fix file operations to prevent command injection
- Update expired smime certificates
- Add testing using old certificates (sha1) to have both types of
certificates (sha1, sha256) checked with S/MIME
Updated packages:
-
openssl-1.0.2k-26.el7_9.tuxcare.els1.x86_64.rpm
sha:7f66d4f4646a48cf26af75a49ba76037d780455e
-
openssl-devel-1.0.2k-26.el7_9.tuxcare.els1.i686.rpm
sha:cc9802a636d98781be9c6f33f884e5a749fbf548
-
openssl-devel-1.0.2k-26.el7_9.tuxcare.els1.x86_64.rpm
sha:6c67a5c9104601eddfa402c055accc5d516c5523
-
openssl-libs-1.0.2k-26.el7_9.tuxcare.els1.i686.rpm
sha:24a4bf025c9bb221679863f1a7c663f2d2c9fe3a
-
openssl-libs-1.0.2k-26.el7_9.tuxcare.els1.x86_64.rpm
sha:459882a1f8f407d3f97b4de31e623831b6a2bf3f
-
openssl-perl-1.0.2k-26.el7_9.tuxcare.els1.x86_64.rpm
sha:9040a5628791e15bb864207a25650ad6adaee0ad
-
openssl-static-1.0.2k-26.el7_9.tuxcare.els1.i686.rpm
sha:3bb08bb608d35424f6d7c114f99dac942d358096
-
openssl-static-1.0.2k-26.el7_9.tuxcare.els1.x86_64.rpm
sha:4f5ec557e5c7c5fcada89869de9f5fab20040b94
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.