[CLSA-2022:1643727489] Fix of CVE: CVE-2021-23840, CVE-2021-3712, CVE-2021-23841
Type:
security
Severity:
moderate
Release date:
2022-02-01
Description:
- CVE-2021-3712: openssl: Read buffer overruns processing ASN.1 strings - CVE-2021-23840: openssl: integer overflow in CipherUpdate - CVE-2021-23841: openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
Updated packages:
  • openssl-static-1.1.1g-15.el8.4.tuxcare.els1.x86_64.rpm
    sha:bb8caa009e215eb77b956377bee70ba20c8516e1
  • openssl-libs-1.1.1g-15.el8.4.tuxcare.els1.x86_64.rpm
    sha:deb42be757c45687ccdddcd392756d62399058ca
  • openssl-devel-1.1.1g-15.el8.4.tuxcare.els1.x86_64.rpm
    sha:09fdaa174d9060e7cb44ee5014408c0cdd79da7e
  • openssl-1.1.1g-15.el8.4.tuxcare.els1.x86_64.rpm
    sha:5ba088401ecdd34c67d88b741120293c693e95df
  • openssl-perl-1.1.1g-15.el8.4.tuxcare.els1.x86_64.rpm
    sha:228b3164f8ae0e3f9aba62b4161b6352f89aa163
  • openssl-libs-1.1.1g-15.el8.4.tuxcare.els1.i686.rpm
    sha:5d1dcd666226e63cec33ff29ad78ada92cc3b632
  • openssl-devel-1.1.1g-15.el8.4.tuxcare.els1.i686.rpm
    sha:88874289ba68e4e8edde3f830c188e472e4dd9c3
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.