[CLSA-2022:1657816793] Fixed CVEs in openssl: CVE-2022-1292, CVE-2022-2068
Type:
security
Severity:
Critical
Release date:
2022-07-14
Description:
- CVE-2022-1292: c_rehash: Do not use shell to invoke openssl to prevent command injection - CVE-2022-2068: c_rehash: Fix file operations to prevent command injection - Update expired SCT certificates
Updated packages:
  • openssl-perl-1.1.1g-15.el8.4.tuxcare.els3.x86_64.rpm
    sha:d5ad6fb6f2f62112254ce9850119a87bc455f6b1
  • openssl-static-1.1.1g-15.el8.4.tuxcare.els3.x86_64.rpm
    sha:3b70a0d699ff69bf5a266cb73549d6dd83b2e3ff
  • openssl-1.1.1g-15.el8.4.tuxcare.els3.x86_64.rpm
    sha:41b31db7593086d2a04f32c3030d31d19a2d62d5
  • openssl-libs-1.1.1g-15.el8.4.tuxcare.els3.i686.rpm
    sha:e02f10d9bb141fe019ea5067da2e78ab365e577e
  • openssl-devel-1.1.1g-15.el8.4.tuxcare.els3.i686.rpm
    sha:86e31a28d0d48da4262a5c08ca7e5db5b4724127
  • openssl-libs-1.1.1g-15.el8.4.tuxcare.els3.x86_64.rpm
    sha:94e1b44b3e7a785d487d917c9fc2c181f138b305
  • openssl-devel-1.1.1g-15.el8.4.tuxcare.els3.x86_64.rpm
    sha:e5f3ffeb6ad4c7b130cdcd4645ffe7ad7ffe9021
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.