[CLSA-2023:1699439565] openssl: Fix of CVE-2021-3711
Type:
security
Severity:
Critical
Release date:
2023-11-08
Description:
- CVE-2021-3711: Fix an incorrect buffer size calculation leads to an overflow - Check the plaintext buffer is large enough when decrypting SM2 - Add extended tests for SM2
Updated packages:
  • openssl-1.1.1k-5.el8.5.tuxcare.els9.x86_64.rpm
    sha:540bcacf5569fc14ae018ef0ecae06cde367e608
  • openssl-devel-1.1.1k-5.el8.5.tuxcare.els9.i686.rpm
    sha:23aa9d4e13e6712c15202943ac45c7c9f7a39eb8
  • openssl-devel-1.1.1k-5.el8.5.tuxcare.els9.x86_64.rpm
    sha:52e5e515d90f3ca85bc34b80d3be7ec6a8b26968
  • openssl-libs-1.1.1k-5.el8.5.tuxcare.els9.i686.rpm
    sha:39fc0966fcbb36c838e2574bc0eee8e2f843320a
  • openssl-libs-1.1.1k-5.el8.5.tuxcare.els9.x86_64.rpm
    sha:27293999790b6bb6f48ba9b806965150a3e32eaf
  • openssl-perl-1.1.1k-5.el8.5.tuxcare.els9.x86_64.rpm
    sha:35e1a30697f10f7d27fd7fda6740404322d0694e
  • openssl-static-1.1.1k-5.el8.5.tuxcare.els9.x86_64.rpm
    sha:e84a294931dc5ac0c31ac50468ff3c5c60288842
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.