[CLSA-2023:1680210075] openssl: Fix of 2 CVEs
Type:
security
Severity:
Important
Release date:
2023-03-30
Description:
- CVE-2022-4304: fix timing based side channel in RSA decryption - CVE-2022-4450: avoid dangling pointers in PEM_read_bio_ex()
Updated packages:
  • openssl-1.1.1k-5.el8.5.tuxcare.els5.x86_64.rpm
    sha:0280188e1708ea6584edc602e6e923ec80fdc0ce
  • openssl-devel-1.1.1k-5.el8.5.tuxcare.els5.i686.rpm
    sha:92a1f31f7be16bc23c8945ef8d643486ca3fc850
  • openssl-devel-1.1.1k-5.el8.5.tuxcare.els5.x86_64.rpm
    sha:73898059ff051360dce26ac2cfedc25092cdb8c1
  • openssl-libs-1.1.1k-5.el8.5.tuxcare.els5.i686.rpm
    sha:a85203fedbdf0f1488ad2316102a38872253a0c9
  • openssl-libs-1.1.1k-5.el8.5.tuxcare.els5.x86_64.rpm
    sha:904ca3c2164615b3541edf3aeeb60d73a875e9a4
  • openssl-perl-1.1.1k-5.el8.5.tuxcare.els5.x86_64.rpm
    sha:7b3e8df9e102898d561b8decc40f35ac33a17f6b
  • openssl-static-1.1.1k-5.el8.5.tuxcare.els5.x86_64.rpm
    sha:55028f3d027ef4b8762642d4c7a66fe2b3423e04
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.