Description:
- CVE-2022-1292: c_rehash: Do not use shell to invoke openssl to prevent
command injection
- CVE-2022-2068: c_rehash: Fix file operations to prevent command injection
- Update expired SCT certificates
Updated packages:
-
openssl-perl-1.1.1g-15.el8.4.tuxcare.els3.x86_64.rpm
sha:d5ad6fb6f2f62112254ce9850119a87bc455f6b1
-
openssl-static-1.1.1g-15.el8.4.tuxcare.els3.x86_64.rpm
sha:3b70a0d699ff69bf5a266cb73549d6dd83b2e3ff
-
openssl-1.1.1g-15.el8.4.tuxcare.els3.x86_64.rpm
sha:41b31db7593086d2a04f32c3030d31d19a2d62d5
-
openssl-libs-1.1.1g-15.el8.4.tuxcare.els3.i686.rpm
sha:e02f10d9bb141fe019ea5067da2e78ab365e577e
-
openssl-devel-1.1.1g-15.el8.4.tuxcare.els3.i686.rpm
sha:86e31a28d0d48da4262a5c08ca7e5db5b4724127
-
openssl-libs-1.1.1g-15.el8.4.tuxcare.els3.x86_64.rpm
sha:94e1b44b3e7a785d487d917c9fc2c181f138b305
-
openssl-devel-1.1.1g-15.el8.4.tuxcare.els3.x86_64.rpm
sha:e5f3ffeb6ad4c7b130cdcd4645ffe7ad7ffe9021
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.