Description:
- CVE-2022-1292: c_rehash: Do not use shell to invoke openssl to prevent
command injection
- CVE-2022-2068: c_rehash: Fix file operations to prevent command injection
- Update expired SCT certificates
Updated packages:
-
openssl-static-1.1.1k-5.el8.5.tuxcare.els2.x86_64.rpm
sha:14b3239dc90f641feddb754d9441fcc11ca4a834
-
openssl-libs-1.1.1k-5.el8.5.tuxcare.els2.i686.rpm
sha:e02bc98abbecde3b164f1440fb01e137c3e342d8
-
openssl-perl-1.1.1k-5.el8.5.tuxcare.els2.x86_64.rpm
sha:d24155976eaa411def398b77538bacd13a1dbc23
-
openssl-devel-1.1.1k-5.el8.5.tuxcare.els2.x86_64.rpm
sha:32ec8d9232c0a39109e31c63a8627a9cb6d7120f
-
openssl-1.1.1k-5.el8.5.tuxcare.els2.x86_64.rpm
sha:47faab3ceffc02ba02efb003858e3591bad51a37
-
openssl-devel-1.1.1k-5.el8.5.tuxcare.els2.i686.rpm
sha:875787b8b477204d1294b013e6cf88c7d37724e0
-
openssl-libs-1.1.1k-5.el8.5.tuxcare.els2.x86_64.rpm
sha:461d129a904cb8e42693f08d5a53d8f74fad90d5
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.