ELSA-2010-0979

ELSA-2010-0979 - openssl security update

Type:SECURITY
Impact:MODERATE
Release Date:2011-02-10

Description



[1.0.0-4.2]
- disable code for SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG - CVE-2010-3864
(#649304)

[1.0.0-4.1]
- fix race in extension parsing code - CVE-2010-3864 (#649304)


Related CVEs


CVE-2010-4180
CVE-2010-3864

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) openssl-1.0.0-4.el6_0.2.src.rpm64824d5d6b13bca9bce45bb424034923d1af27bffec92bd25c793c6215430ff6ELSA-2023-12326ol6_ga_i386_patch
openssl-1.0.0-4.el6_0.2.src.rpm64824d5d6b13bca9bce45bb424034923d1af27bffec92bd25c793c6215430ff6ELSA-2023-12326ol6_i386_latest_archive
openssl-1.0.0-4.el6_0.2.i686.rpm42ce722546211ca6b4877c42ead6db8165c01587a892e163da3a2159c9507b12ELSA-2023-12326ol6_ga_i386_patch
openssl-1.0.0-4.el6_0.2.i686.rpm42ce722546211ca6b4877c42ead6db8165c01587a892e163da3a2159c9507b12ELSA-2023-12326ol6_i386_latest_archive
openssl-devel-1.0.0-4.el6_0.2.i686.rpm3c8d9b60a1896c49a4d1c023a0a97bdc76a43397edbf25c8af7fea8638b8c772ELSA-2023-12326ol6_ga_i386_patch
openssl-devel-1.0.0-4.el6_0.2.i686.rpm3c8d9b60a1896c49a4d1c023a0a97bdc76a43397edbf25c8af7fea8638b8c772ELSA-2023-12326ol6_i386_latest_archive
openssl-perl-1.0.0-4.el6_0.2.i686.rpmcf672e5882dde4caafd5f45f5e8d82c8ebeb9f9873f96c732def25a4489aa4f8ELSA-2023-12326ol6_ga_i386_patch
openssl-perl-1.0.0-4.el6_0.2.i686.rpmcf672e5882dde4caafd5f45f5e8d82c8ebeb9f9873f96c732def25a4489aa4f8ELSA-2023-12326ol6_i386_latest_archive
openssl-static-1.0.0-4.el6_0.2.i686.rpmffdd3208a872fd55c34d3279b7fa24966806d9cd5131aedfa454525d7933a1c4ELSA-2023-12326ol6_ga_i386_patch
openssl-static-1.0.0-4.el6_0.2.i686.rpmffdd3208a872fd55c34d3279b7fa24966806d9cd5131aedfa454525d7933a1c4ELSA-2023-12326ol6_i386_latest_archive
Oracle Linux 6 (x86_64) openssl-1.0.0-4.el6_0.2.src.rpm64824d5d6b13bca9bce45bb424034923d1af27bffec92bd25c793c6215430ff6ELSA-2023-12326ol6_ga_x86_64_patch
openssl-1.0.0-4.el6_0.2.src.rpm64824d5d6b13bca9bce45bb424034923d1af27bffec92bd25c793c6215430ff6ELSA-2023-12326ol6_x86_64_latest_archive
openssl-1.0.0-4.el6_0.2.i686.rpm42ce722546211ca6b4877c42ead6db8165c01587a892e163da3a2159c9507b12ELSA-2023-12326ol6_ga_x86_64_patch
openssl-1.0.0-4.el6_0.2.i686.rpm42ce722546211ca6b4877c42ead6db8165c01587a892e163da3a2159c9507b12ELSA-2023-12326ol6_x86_64_latest_archive
openssl-1.0.0-4.el6_0.2.x86_64.rpma592b47b753a89bb2c2ce23f1f98c4b38fb0710b50e67f194fa73019ee2b3074ELSA-2023-12326ol6_ga_x86_64_patch
openssl-1.0.0-4.el6_0.2.x86_64.rpma592b47b753a89bb2c2ce23f1f98c4b38fb0710b50e67f194fa73019ee2b3074ELSA-2023-12326ol6_x86_64_latest_archive
openssl-devel-1.0.0-4.el6_0.2.i686.rpm3c8d9b60a1896c49a4d1c023a0a97bdc76a43397edbf25c8af7fea8638b8c772ELSA-2023-12326ol6_ga_x86_64_patch
openssl-devel-1.0.0-4.el6_0.2.i686.rpm3c8d9b60a1896c49a4d1c023a0a97bdc76a43397edbf25c8af7fea8638b8c772ELSA-2023-12326ol6_x86_64_latest_archive
openssl-devel-1.0.0-4.el6_0.2.x86_64.rpm485c02b843bfcc3061049ab943743e6ad24a7d9e0f42a74451d163d05e7cc5efELSA-2023-12326ol6_ga_x86_64_patch
openssl-devel-1.0.0-4.el6_0.2.x86_64.rpm485c02b843bfcc3061049ab943743e6ad24a7d9e0f42a74451d163d05e7cc5efELSA-2023-12326ol6_x86_64_latest_archive
openssl-perl-1.0.0-4.el6_0.2.x86_64.rpmdc625201a01cd3a9750b344a5eb943f20d44a109c9c245209f9bb657778ea998ELSA-2023-12326ol6_ga_x86_64_patch
openssl-perl-1.0.0-4.el6_0.2.x86_64.rpmdc625201a01cd3a9750b344a5eb943f20d44a109c9c245209f9bb657778ea998ELSA-2023-12326ol6_x86_64_latest_archive
openssl-static-1.0.0-4.el6_0.2.x86_64.rpm098893a5824895e4329dbf045bc921d3866e2a80277f3e2d219dd80b631d855cELSA-2023-12326ol6_ga_x86_64_patch
openssl-static-1.0.0-4.el6_0.2.x86_64.rpm098893a5824895e4329dbf045bc921d3866e2a80277f3e2d219dd80b631d855cELSA-2023-12326ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete