[CLSA-2022:1658171496] Fixed CVEs in openssl: CVE-2022-1292, CVE-2022-2068
Type:
security
Severity:
Critical
Release date:
2022-07-18
Description:
- CVE-2022-1292: c_rehash: Do not use shell to invoke openssl to prevent command injection - CVE-2022-2068: c_rehash: Fix file operations to prevent command injection - Update expired SCT certificates
Updated packages:
  • openssl-static-1.1.1k-5.el8.5.tuxcare.els2.x86_64.rpm
    sha:14b3239dc90f641feddb754d9441fcc11ca4a834
  • openssl-libs-1.1.1k-5.el8.5.tuxcare.els2.i686.rpm
    sha:e02bc98abbecde3b164f1440fb01e137c3e342d8
  • openssl-perl-1.1.1k-5.el8.5.tuxcare.els2.x86_64.rpm
    sha:d24155976eaa411def398b77538bacd13a1dbc23
  • openssl-devel-1.1.1k-5.el8.5.tuxcare.els2.x86_64.rpm
    sha:32ec8d9232c0a39109e31c63a8627a9cb6d7120f
  • openssl-1.1.1k-5.el8.5.tuxcare.els2.x86_64.rpm
    sha:47faab3ceffc02ba02efb003858e3591bad51a37
  • openssl-devel-1.1.1k-5.el8.5.tuxcare.els2.i686.rpm
    sha:875787b8b477204d1294b013e6cf88c7d37724e0
  • openssl-libs-1.1.1k-5.el8.5.tuxcare.els2.x86_64.rpm
    sha:461d129a904cb8e42693f08d5a53d8f74fad90d5
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.