Release date:
2023-05-04 21:29:24 UTC
Description:
* SECURITY UPDATE: Excessive resource use verifying X.509 policy constraints
- debian/patches/CVE-2023-0464.patch: Limit X.509 certificate tree size to
avoid exponential use of computational resources
- CVE-2023-0464
* SECURITY UPDATE: Incorrecly documented X509_VERIFY_PARAM_add0_policy()
- debian/patches/CVE-2023-0466.patch: Align documentation with actual
implementation
- CVE-2023-0466
* SECURITY UPDATE: Double locking in X.509 policy cache handling
- debian/patches/CVE-2022-3996.patch: Revert previously introduced
redundant flag setting and so avoid locking at all
- CVE-2022-3996
Updated packages:
-
libssl-dev_1.0.2g-1ubuntu4.21+tuxcare.els6_amd64.deb
sha:f2506d981c0f10418265c51941f1c5ac88bd4b7a
-
libssl-doc_1.0.2g-1ubuntu4.21+tuxcare.els6_all.deb
sha:dcf8a3913f78086b465f07cc4520341fd53daad6
-
libssl1.0.0_1.0.2g-1ubuntu4.21+tuxcare.els6_amd64.deb
sha:b66c4778b37941bd2781fd79dcf973e5e633cf40
-
openssl_1.0.2g-1ubuntu4.21+tuxcare.els6_amd64.deb
sha:b0fbe5c22e8d5a83665ba25db8b5efd700362988
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.