Description:
- CVE-2022-4304: fix timing based side channel in RSA decryption
- CVE-2022-4450: avoid dangling pointers in PEM_read_bio_ex()
Updated packages:
-
openssl-1.1.1g-15.el8.4.tuxcare.els6.x86_64.rpm
sha:c860500fa5f0d45868bfce9f52f329424ba70674
-
openssl-devel-1.1.1g-15.el8.4.tuxcare.els6.i686.rpm
sha:cdf4437219add0786d15d538626b7a3e62ca9528
-
openssl-devel-1.1.1g-15.el8.4.tuxcare.els6.x86_64.rpm
sha:875b4de06e39cc782918723aec066669eadec34c
-
openssl-libs-1.1.1g-15.el8.4.tuxcare.els6.i686.rpm
sha:79f98d3f79649768676a6fbb91833bf071b60be4
-
openssl-libs-1.1.1g-15.el8.4.tuxcare.els6.x86_64.rpm
sha:6d3de192cfaa78fb99e32df894184314ced1a6f1
-
openssl-perl-1.1.1g-15.el8.4.tuxcare.els6.x86_64.rpm
sha:8a0f82d5f82366c7000c5997f163be685dfff0df
-
openssl-static-1.1.1g-15.el8.4.tuxcare.els6.x86_64.rpm
sha:ee184b831050ce69be346b99e7a93f36e69dec39
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.