stable

openssl11-1.1.1k-4.el7

FEDORA-EPEL-2022-e05ac11f9b created by robert 2 years ago for Fedora EPEL 7
  • backport from 1.1.1k-7: CVE-2022-2097: AES OCB fails to encrypt some bytes on 32-bit x86

    Resolves: CVE-2022-2097

  • backport from 1.1.1k-7: Update expired certificates used in the testsuite

    Resolves: #2100554

  • backport from 1.1.1k-7: CVE-2022-1292: openssl: c_rehash script allows command injection

    Resolves: #2090371

  • backport from 1.1.1k-7: CVE-2022-2068: the c_rehash script allows command injection

    Resolves: #2098278

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

This update has been submitted for testing by robert.

2 years ago

This update's test gating status has been changed to 'ignored'.

2 years ago

This update has been pushed to testing.

2 years ago

This update has been submitted for stable by bodhi.

2 years ago

This update has been pushed to stable.

2 years ago

Please log in to add feedback.

Metadata
Type
security
Severity
medium
Karma
0
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
7 days
Dates
submitted
2 years ago
in testing
2 years ago
in stable
2 years ago
BZ#2081494 CVE-2022-1292 openssl: c_rehash script allows command injection
0
0
BZ#2097310 CVE-2022-2068 openssl: the c_rehash script allows command injection
0
0
BZ#2100554 OpenSSL testsuite certificates expired [rhel-8.6.0.z]
0
0
BZ#2104905 CVE-2022-2097 openssl: AES OCB fails to encrypt some bytes
0
0
BZ#2105032 CVE-2022-2097 openssl11: openssl: AES OCB fails to encrypt some bytes [epel-7]
0
0

Automated Test Results