ELSA-2007-0964

ELSA-2007-0964 - Important: openssl security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2007-10-12

Description


[0.9.8b-8.3.2]
- more DTLS fixes (#321211)

[0.9.8b-8.3.1]
- fix CVE-2007-3108 - side channel attack on private keys (#322891)
- fix CVE-2007-5135 - off-by-one in SSL_get_shared_ciphers (#309871)
- fix CVE-2007-4995 - out of order DTLS fragments buffer overflow (#321211)


Related CVEs


CVE-2007-3108
CVE-2007-5135
CVE-2007-4995

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) openssl-0.9.8b-8.3.el5_0.2.src.rpm0478251bfdffdb983ca561f2cad75feed76ba69559b46f545e0311ce19b6b61cELEA-2017-1391el5_ga_i386_patch
openssl-0.9.8b-8.3.el5_0.2.src.rpma01f4dc4fa1c0d0ff232ba507e17ca7c8656a8d5848b25cf202ca3a4a37dd168ELEA-2017-1391el5_u1_i386_base
openssl-0.9.8b-8.3.el5_0.2.i386.rpm4156ca79103e69bd89949edb3810d1defdf8133a2f0edf1bd4046f16de130e65ELEA-2017-1391el5_ga_i386_patch
openssl-0.9.8b-8.3.el5_0.2.i386.rpm4156ca79103e69bd89949edb3810d1defdf8133a2f0edf1bd4046f16de130e65ELEA-2017-1391el5_u1_i386_base
openssl-0.9.8b-8.3.el5_0.2.i686.rpmdb3282fd3f71ba2e7834995542dde91a2e8c8255d75c6441a4042018860c30f9ELEA-2017-1391el5_ga_i386_patch
openssl-0.9.8b-8.3.el5_0.2.i686.rpmdb3282fd3f71ba2e7834995542dde91a2e8c8255d75c6441a4042018860c30f9ELEA-2017-1391el5_u1_i386_base
openssl-devel-0.9.8b-8.3.el5_0.2.i386.rpm3604d0bb8fbb4ef45147cf04e54a5a4552e7bc859a5d1bb2f157ed77baeb598dELEA-2017-1391el5_ga_i386_patch
openssl-devel-0.9.8b-8.3.el5_0.2.i386.rpm3604d0bb8fbb4ef45147cf04e54a5a4552e7bc859a5d1bb2f157ed77baeb598dELEA-2017-1391el5_u1_i386_base
openssl-perl-0.9.8b-8.3.el5_0.2.i386.rpme6a3723ed19467c3f4bdde3b74f54ee8add359e3698288633721eda6290c3180ELEA-2017-1391el5_ga_i386_patch
openssl-perl-0.9.8b-8.3.el5_0.2.i386.rpme6a3723ed19467c3f4bdde3b74f54ee8add359e3698288633721eda6290c3180ELEA-2017-1391el5_u1_i386_base
Oracle Linux 5 (x86_64) openssl-0.9.8b-8.3.el5_0.2.src.rpm0478251bfdffdb983ca561f2cad75feed76ba69559b46f545e0311ce19b6b61cELEA-2017-1391el5_ga_x86_64_patch
openssl-0.9.8b-8.3.el5_0.2.src.rpma01f4dc4fa1c0d0ff232ba507e17ca7c8656a8d5848b25cf202ca3a4a37dd168ELEA-2017-1391el5_u1_x86_64_base
openssl-0.9.8b-8.3.el5_0.2.i686.rpmdb3282fd3f71ba2e7834995542dde91a2e8c8255d75c6441a4042018860c30f9ELEA-2017-1391el5_ga_x86_64_patch
openssl-0.9.8b-8.3.el5_0.2.i686.rpmdb3282fd3f71ba2e7834995542dde91a2e8c8255d75c6441a4042018860c30f9ELEA-2017-1391el5_u1_x86_64_base
openssl-0.9.8b-8.3.el5_0.2.x86_64.rpmaf951ed2dbe7acc73f1ef1efa90595ddd2f297eefe8b406bbdd9ab96b0d4cf6dELEA-2017-1391el5_ga_x86_64_patch
openssl-0.9.8b-8.3.el5_0.2.x86_64.rpmaf951ed2dbe7acc73f1ef1efa90595ddd2f297eefe8b406bbdd9ab96b0d4cf6dELEA-2017-1391el5_u1_x86_64_base
openssl-devel-0.9.8b-8.3.el5_0.2.i386.rpm3604d0bb8fbb4ef45147cf04e54a5a4552e7bc859a5d1bb2f157ed77baeb598dELEA-2017-1391el5_ga_x86_64_patch
openssl-devel-0.9.8b-8.3.el5_0.2.i386.rpm3604d0bb8fbb4ef45147cf04e54a5a4552e7bc859a5d1bb2f157ed77baeb598dELEA-2017-1391el5_u1_x86_64_base
openssl-devel-0.9.8b-8.3.el5_0.2.x86_64.rpm2b5cfbcd9187c79f3b2bd1bd4bc268c8ff87535c78f764666658d92229b265cfELEA-2017-1391el5_ga_x86_64_patch
openssl-devel-0.9.8b-8.3.el5_0.2.x86_64.rpm2b5cfbcd9187c79f3b2bd1bd4bc268c8ff87535c78f764666658d92229b265cfELEA-2017-1391el5_u1_x86_64_base
openssl-perl-0.9.8b-8.3.el5_0.2.x86_64.rpm01c0beb913430483dcda2f6b9bf9362d87f8859f11cbe192acc731c182db95cfELEA-2017-1391el5_ga_x86_64_patch
openssl-perl-0.9.8b-8.3.el5_0.2.x86_64.rpm01c0beb913430483dcda2f6b9bf9362d87f8859f11cbe192acc731c182db95cfELEA-2017-1391el5_u1_x86_64_base



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete