ELSA-2014-0625

ELSA-2014-0625 - openssl security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2014-06-05

Description


[1.0.1e-16.14]
- fix CVE-2010-5298 - possible use of memory after free
- fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment
- fix CVE-2014-0198 - possible NULL pointer dereference
- fix CVE-2014-0221 - DoS from invalid DTLS handshake packet
- fix CVE-2014-0224 - SSL/TLS MITM vulnerability
- fix CVE-2014-3470 - client-side DoS when using anonymous ECDH


Related CVEs


CVE-2014-3470
CVE-2014-0195
CVE-2014-0221
CVE-2010-5298
CVE-2014-0198
CVE-2014-0224

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) openssl-1.0.1e-16.el6_5.14.src.rpmd3541b0a3c56b8618d1c44093872b3f3ce9dee438e62d10e77a8e2452eeb195fELSA-2023-12326ol6_i386_latest_archive
openssl-1.0.1e-16.el6_5.14.src.rpmd3541b0a3c56b8618d1c44093872b3f3ce9dee438e62d10e77a8e2452eeb195fELSA-2023-12326ol6_u5_i386_patch
openssl-1.0.1e-16.el6_5.14.i686.rpmfaba41718a76bdc77c28cd0edcccde21a36203c0dc0d2d141d2957db96b015a6ELSA-2023-12326ol6_i386_latest_archive
openssl-1.0.1e-16.el6_5.14.i686.rpmfaba41718a76bdc77c28cd0edcccde21a36203c0dc0d2d141d2957db96b015a6ELSA-2023-12326ol6_u5_i386_patch
openssl-devel-1.0.1e-16.el6_5.14.i686.rpme1656743e1c237e056ac03c603dd49972ca3c73ef4eaefe2eb6ab65ef44c47b4ELSA-2023-12326ol6_i386_latest_archive
openssl-devel-1.0.1e-16.el6_5.14.i686.rpme1656743e1c237e056ac03c603dd49972ca3c73ef4eaefe2eb6ab65ef44c47b4ELSA-2023-12326ol6_u5_i386_patch
openssl-perl-1.0.1e-16.el6_5.14.i686.rpm45bb5877e7bf5da8da688128ceefcc02d3a2cf1484afb01bf1fbef6634f9adf3ELSA-2023-12326ol6_i386_latest_archive
openssl-perl-1.0.1e-16.el6_5.14.i686.rpm45bb5877e7bf5da8da688128ceefcc02d3a2cf1484afb01bf1fbef6634f9adf3ELSA-2023-12326ol6_u5_i386_patch
openssl-static-1.0.1e-16.el6_5.14.i686.rpm2ee3d50e347988b82a6fe236e2e42eb6f03eff2a587fd82b16cf90598e068ba4ELSA-2023-12326ol6_i386_latest_archive
openssl-static-1.0.1e-16.el6_5.14.i686.rpm2ee3d50e347988b82a6fe236e2e42eb6f03eff2a587fd82b16cf90598e068ba4ELSA-2023-12326ol6_u5_i386_patch
Oracle Linux 6 (x86_64) openssl-1.0.1e-16.el6_5.14.src.rpmd3541b0a3c56b8618d1c44093872b3f3ce9dee438e62d10e77a8e2452eeb195fELSA-2023-12326ol6_u5_x86_64_patch
openssl-1.0.1e-16.el6_5.14.src.rpmd3541b0a3c56b8618d1c44093872b3f3ce9dee438e62d10e77a8e2452eeb195fELSA-2023-12326ol6_x86_64_latest_archive
openssl-1.0.1e-16.el6_5.14.i686.rpmfaba41718a76bdc77c28cd0edcccde21a36203c0dc0d2d141d2957db96b015a6ELSA-2023-12326ol6_u5_x86_64_patch
openssl-1.0.1e-16.el6_5.14.i686.rpmfaba41718a76bdc77c28cd0edcccde21a36203c0dc0d2d141d2957db96b015a6ELSA-2023-12326ol6_x86_64_latest_archive
openssl-1.0.1e-16.el6_5.14.x86_64.rpmd245f53356db7adcd2ef7a6c7e4d5d8d93aa2d485f929e7f1c5ef8aa3e4ef14bELSA-2023-12326ol6_u5_x86_64_patch
openssl-1.0.1e-16.el6_5.14.x86_64.rpmd245f53356db7adcd2ef7a6c7e4d5d8d93aa2d485f929e7f1c5ef8aa3e4ef14bELSA-2023-12326ol6_x86_64_latest_archive
openssl-devel-1.0.1e-16.el6_5.14.i686.rpme1656743e1c237e056ac03c603dd49972ca3c73ef4eaefe2eb6ab65ef44c47b4ELSA-2023-12326ol6_u5_x86_64_patch
openssl-devel-1.0.1e-16.el6_5.14.i686.rpme1656743e1c237e056ac03c603dd49972ca3c73ef4eaefe2eb6ab65ef44c47b4ELSA-2023-12326ol6_x86_64_latest_archive
openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpmbc2be62ea83520a275676977d31910b766b537d9e809bdf96e06606efdb0b7e6ELSA-2023-12326ol6_u5_x86_64_patch
openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpmbc2be62ea83520a275676977d31910b766b537d9e809bdf96e06606efdb0b7e6ELSA-2023-12326ol6_x86_64_latest_archive
openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm3f58d98de624dffdbf91958357eec3a46a59130fbe17cad355f533c1a5ce9a58ELSA-2023-12326ol6_u5_x86_64_patch
openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm3f58d98de624dffdbf91958357eec3a46a59130fbe17cad355f533c1a5ce9a58ELSA-2023-12326ol6_x86_64_latest_archive
openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm2ae2150ffe84b9d53bed77d674647555117f000c53eb56c5758a007d32869769ELSA-2023-12326ol6_u5_x86_64_patch
openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm2ae2150ffe84b9d53bed77d674647555117f000c53eb56c5758a007d32869769ELSA-2023-12326ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete