Description:
- CVE-2023-0464: Fix excessive resource use verifying X.509 policy constraints
- CVE-2023-0466: Fix documentation of X509_VERIFY_PARAM_add0_policy()
- CVE-2022-3996: Drop redundant flag setting in policy_cache_set_mapping()
Updated packages:
-
openssl-1.0.1e-63.el6.tuxcare.els9.i686.rpm
sha:42d848e3638e024d64a5980f0df81cf35973fd38
-
openssl-1.0.1e-63.el6.tuxcare.els9.x86_64.rpm
sha:950b4b3edb4d14bc2591f443002fb277c275ba1c
-
openssl-devel-1.0.1e-63.el6.tuxcare.els9.i686.rpm
sha:090b7a3270d2d29a231bcca0dfecc4dc607d334f
-
openssl-devel-1.0.1e-63.el6.tuxcare.els9.x86_64.rpm
sha:d08004f5b7f0592c96d63e95450dc2a8e943f8c8
-
openssl-perl-1.0.1e-63.el6.tuxcare.els9.x86_64.rpm
sha:93392bd979ac74908ab650ab4251c88676f76320
-
openssl-static-1.0.1e-63.el6.tuxcare.els9.x86_64.rpm
sha:594f9523a5e80bb33b954bedf094280d6d6bcd94
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.