Description:
- CVE-2022-4304: fix timing based side channel in RSA decryption
- CVE-2022-4450: avoid dangling pointers in PEM_read_bio_ex()
Updated packages:
-
openssl-1.1.1k-5.el8.5.tuxcare.els5.x86_64.rpm
sha:0280188e1708ea6584edc602e6e923ec80fdc0ce
-
openssl-devel-1.1.1k-5.el8.5.tuxcare.els5.i686.rpm
sha:92a1f31f7be16bc23c8945ef8d643486ca3fc850
-
openssl-devel-1.1.1k-5.el8.5.tuxcare.els5.x86_64.rpm
sha:73898059ff051360dce26ac2cfedc25092cdb8c1
-
openssl-libs-1.1.1k-5.el8.5.tuxcare.els5.i686.rpm
sha:a85203fedbdf0f1488ad2316102a38872253a0c9
-
openssl-libs-1.1.1k-5.el8.5.tuxcare.els5.x86_64.rpm
sha:904ca3c2164615b3541edf3aeeb60d73a875e9a4
-
openssl-perl-1.1.1k-5.el8.5.tuxcare.els5.x86_64.rpm
sha:7b3e8df9e102898d561b8decc40f35ac33a17f6b
-
openssl-static-1.1.1k-5.el8.5.tuxcare.els5.x86_64.rpm
sha:55028f3d027ef4b8762642d4c7a66fe2b3423e04
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.