FEDORA-EPEL-2021-857a9f7853 created by robert 8 months ago for Fedora EPEL 7
stable
  • backport from 1.1.1g-15: version bump
  • backport from 1.1.1g-14: CVE-2021-3450 openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT
  • backport from 1.1.1g-13: Fix CVE-2021-3449 NULL pointer deref in signature_algorithms processing

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

This update has been submitted for testing by robert.

8 months ago

This update's test gating status has been changed to 'ignored'.

8 months ago

This update's test gating status has been changed to 'waiting'.

8 months ago

This update's test gating status has been changed to 'ignored'.

8 months ago

This update has been pushed to testing.

8 months ago

robert edited this update.

8 months ago

This update can be pushed to stable now if the maintainer wishes

7 months ago

This update has been submitted for stable by bodhi.

7 months ago

This update has been pushed to stable.

7 months ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
14 days
Dates
submitted
8 months ago
in testing
8 months ago
in stable
7 months ago
modified
8 months ago
BZ#1941547 CVE-2021-3450 openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT
0
0
BZ#1941554 CVE-2021-3449 openssl: NULL pointer dereference in signature_algorithms processing
0
0
BZ#1943177 CVE-2021-3450 openssl11: openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT [epel-7]
0
0
BZ#1943179 CVE-2021-3449 openssl11: openssl: NULL pointer dereference in signature_algorithms processing [epel-7]
0
0

Automated Test Results