ELBA-2020-6024

ELBA-2020-6024 - openssl bug fix update

Type:BUG
Severity:NA
Release Date:2020-12-22

Description


[1.1.1g-12]
- Fix CVE-2020-1971 ediparty null pointer dereference

[1.1.1g-11.1]
- Implemented new FIPS requirements in regards to KDF and DH selftests
- Disallow certificates with explicit EC parameters




Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 8 (x86_64) openssl-1.1.1g-12.ksplice1.el8_3.src.rpmf4cb2fc264f281e742f9d5a6a8fe069d-
openssl-1.1.1g-12.ksplice1.el8_3.x86_64.rpm83dc55539bf484009acfc3853f9893e0-
openssl-devel-1.1.1g-12.ksplice1.el8_3.i686.rpm057e87b98f71a163d3f06933119aa456-
openssl-devel-1.1.1g-12.ksplice1.el8_3.x86_64.rpm902acd5c871bf4b4a47a0f0f0bc22cfd-
openssl-libs-1.1.1g-12.ksplice1.el8_3.i686.rpmc86dc54dad11f7f9c46b4403a972ad36-
openssl-libs-1.1.1g-12.ksplice1.el8_3.x86_64.rpm01ee380078b87414b94479165ceafffe-
openssl-perl-1.1.1g-12.ksplice1.el8_3.x86_64.rpm1d6fb9ae0dcec9874bdb74cd6a1fd967-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete