Fedora Linux 8811 Published by

An openssl security update has been released for Fedora 36.



SECURITY: Fedora 36 Update: openssl1.1-1.1.1p-1.fc36


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-3b7d0abd0b
2022-07-06 01:36:52.575334
--------------------------------------------------------------------------------

Name : openssl1.1
Product : Fedora 36
Version : 1.1.1p
Release : 1.fc36
URL :   http://www.openssl.org/
Summary : Compatibility version of the OpenSSL library
Description :
The OpenSSL toolkit provides support for secure communications between
machines. This version of OpenSSL package contains only the libraries
from the 1.1.1 version and is provided for compatibility with previous
releases.

--------------------------------------------------------------------------------
Update Information:

``` * Thu Jun 30 2022 Clemens Lang - 1:1.1.1p-1 - Upgrade to
1.1.1p Resolves: CVE-2022-2068 Related: rhbz#2099975 ``` Security fix for
CVE-2022-2068
--------------------------------------------------------------------------------
ChangeLog:

* Thu Jun 30 2022 Clemens Lang - 1:1.1.1p-1
- Upgrade to 1.1.1p
Resolves: CVE-2022-2068
Related: rhbz#2099975
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2097310 - CVE-2022-2068 openssl: the c_rehash script allows command injection
  https://bugzilla.redhat.com/show_bug.cgi?id=2097310
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-3b7d0abd0b' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________