https://bugzilla.redhat.com/show_bug.cgi?id=2081494
Mauro Matteo Cascella mcascell@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |2095812, 2095818, 2095816, | |2095814, 2095817, 2095815, | |2095813
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2095812 [Bug 2095812] CVE-2022-1292 openssl: c_rehash script allows command injection [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2095813 [Bug 2095813] CVE-2022-1292 openssl11: openssl: c_rehash script allows command injection [epel-7] https://bugzilla.redhat.com/show_bug.cgi?id=2095814 [Bug 2095814] CVE-2022-1292 openssl3: openssl: c_rehash script allows command injection [epel-8] https://bugzilla.redhat.com/show_bug.cgi?id=2095815 [Bug 2095815] CVE-2022-1292 mingw-openssl: openssl: c_rehash script allows command injection [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2095816 [Bug 2095816] CVE-2022-1292 edk2: openssl: c_rehash script allows command injection [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2095817 [Bug 2095817] CVE-2022-1292 openssl1.1: openssl: c_rehash script allows command injection [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2095818 [Bug 2095818] CVE-2022-1292 shim: openssl: c_rehash script allows command injection [fedora-all]