OpenSSL package within CentOS 6 Extended Lifecycle Support with a fix for the CVE-2020-1971 has been rolled out to 100%
We are happy to announce that a new openssl-1.0.1e-59.cloudlinux.
This update contains a fix for the new CVE-2020-1971 that causes servers’ disruptions via x509v3 certificate fields.
Errata: https://errata.cloudlinux.com/
Changelog
openssl-1.0.1e-59.cloudlinux.
- EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)
Update command
yum update openssl*