Description:
- CVE-2021-3711: Fix an incorrect buffer size calculation leads to an overflow
- Check the plaintext buffer is large enough when decrypting SM2
- Add extended tests for SM2
Updated packages:
-
openssl-1.1.1g-15.el8.4.tuxcare.els10.x86_64.rpm
sha:758b1fc8651285533f72fd217f0946dc91bd84a1
-
openssl-devel-1.1.1g-15.el8.4.tuxcare.els10.i686.rpm
sha:8739363ed4521d16bbc3315dde9841a1d2f582e4
-
openssl-devel-1.1.1g-15.el8.4.tuxcare.els10.x86_64.rpm
sha:ecb940788b73759264acdd7a11d52a325b65a73e
-
openssl-libs-1.1.1g-15.el8.4.tuxcare.els10.i686.rpm
sha:05ff71d2b3e5c986012b49da8dae788eb31f84ac
-
openssl-libs-1.1.1g-15.el8.4.tuxcare.els10.x86_64.rpm
sha:d86d571cd80d6cc554c92f555aff1bbc7dfc8d2c
-
openssl-perl-1.1.1g-15.el8.4.tuxcare.els10.x86_64.rpm
sha:ea565ec182b6ce6f34915dc5cdd19707f173b17c
-
openssl-static-1.1.1g-15.el8.4.tuxcare.els10.x86_64.rpm
sha:a386b49257688ae83cf36419de59f7989e39b0c4
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.