Description:
- CVE-2021-3712: openssl: Read buffer overruns processing ASN.1 strings
- CVE-2021-23840: openssl: integer overflow in CipherUpdate
- CVE-2021-23841: openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
Updated packages:
-
openssl-static-1.1.1g-15.el8.4.tuxcare.els1.x86_64.rpm
sha:bb8caa009e215eb77b956377bee70ba20c8516e1
-
openssl-libs-1.1.1g-15.el8.4.tuxcare.els1.x86_64.rpm
sha:deb42be757c45687ccdddcd392756d62399058ca
-
openssl-devel-1.1.1g-15.el8.4.tuxcare.els1.x86_64.rpm
sha:09fdaa174d9060e7cb44ee5014408c0cdd79da7e
-
openssl-1.1.1g-15.el8.4.tuxcare.els1.x86_64.rpm
sha:5ba088401ecdd34c67d88b741120293c693e95df
-
openssl-perl-1.1.1g-15.el8.4.tuxcare.els1.x86_64.rpm
sha:228b3164f8ae0e3f9aba62b4161b6352f89aa163
-
openssl-libs-1.1.1g-15.el8.4.tuxcare.els1.i686.rpm
sha:5d1dcd666226e63cec33ff29ad78ada92cc3b632
-
openssl-devel-1.1.1g-15.el8.4.tuxcare.els1.i686.rpm
sha:88874289ba68e4e8edde3f830c188e472e4dd9c3
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.