ELSA-2011-1409

ELSA-2011-1409 - openssl security update

Type:SECURITY
Impact:MODERATE
Release Date:2011-10-26

Description



[1.0.0-10.5]
- initialize the X509_STORE_CTX properly for CRL lookups - CVE-2011-3207
(#736087)


Related CVEs


CVE-2011-3207

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) openssl-1.0.0-10.el6_1.5.src.rpmba939b8e146d78d9b117892a86218e42b24da330459044ebbbcba61d6480c063ELSA-2023-12326ol6_i386_latest_archive
openssl-1.0.0-10.el6_1.5.src.rpmba939b8e146d78d9b117892a86218e42b24da330459044ebbbcba61d6480c063ELSA-2023-12326ol6_u1_i386_patch
openssl-1.0.0-10.el6_1.5.i686.rpma00af572aa617bf58b11d35414de6102efc458694d939867b3405fbf84898588ELSA-2023-12326ol6_i386_latest_archive
openssl-1.0.0-10.el6_1.5.i686.rpma00af572aa617bf58b11d35414de6102efc458694d939867b3405fbf84898588ELSA-2023-12326ol6_u1_i386_patch
openssl-devel-1.0.0-10.el6_1.5.i686.rpm21c12fa691d9f5fd94bd62aed408a29ea705f712d81802115e41b8477f9e416eELSA-2023-12326ol6_i386_latest_archive
openssl-devel-1.0.0-10.el6_1.5.i686.rpm21c12fa691d9f5fd94bd62aed408a29ea705f712d81802115e41b8477f9e416eELSA-2023-12326ol6_u1_i386_patch
openssl-perl-1.0.0-10.el6_1.5.i686.rpm433aa190430a80d5cccd50684938de9f2b16e42864a6bae244834a6977800585ELSA-2023-12326ol6_i386_latest_archive
openssl-perl-1.0.0-10.el6_1.5.i686.rpm433aa190430a80d5cccd50684938de9f2b16e42864a6bae244834a6977800585ELSA-2023-12326ol6_u1_i386_patch
openssl-static-1.0.0-10.el6_1.5.i686.rpm1500828054f3af4fddf50f0eed520610b0800ad6088a67caffbcffc24df9d5c3ELSA-2023-12326ol6_i386_latest_archive
openssl-static-1.0.0-10.el6_1.5.i686.rpm1500828054f3af4fddf50f0eed520610b0800ad6088a67caffbcffc24df9d5c3ELSA-2023-12326ol6_u1_i386_patch
Oracle Linux 6 (x86_64) openssl-1.0.0-10.el6_1.5.src.rpmba939b8e146d78d9b117892a86218e42b24da330459044ebbbcba61d6480c063ELSA-2023-12326ol6_u1_x86_64_patch
openssl-1.0.0-10.el6_1.5.src.rpmba939b8e146d78d9b117892a86218e42b24da330459044ebbbcba61d6480c063ELSA-2023-12326ol6_x86_64_latest_archive
openssl-1.0.0-10.el6_1.5.i686.rpma00af572aa617bf58b11d35414de6102efc458694d939867b3405fbf84898588ELSA-2023-12326ol6_u1_x86_64_patch
openssl-1.0.0-10.el6_1.5.i686.rpma00af572aa617bf58b11d35414de6102efc458694d939867b3405fbf84898588ELSA-2023-12326ol6_x86_64_latest_archive
openssl-1.0.0-10.el6_1.5.x86_64.rpmff43acfba8ff5a235ecf421310f21aa32709fa908bde942b615c757bea23ae07ELSA-2023-12326ol6_u1_x86_64_patch
openssl-1.0.0-10.el6_1.5.x86_64.rpmff43acfba8ff5a235ecf421310f21aa32709fa908bde942b615c757bea23ae07ELSA-2023-12326ol6_x86_64_latest_archive
openssl-devel-1.0.0-10.el6_1.5.i686.rpm21c12fa691d9f5fd94bd62aed408a29ea705f712d81802115e41b8477f9e416eELSA-2023-12326ol6_u1_x86_64_patch
openssl-devel-1.0.0-10.el6_1.5.i686.rpm21c12fa691d9f5fd94bd62aed408a29ea705f712d81802115e41b8477f9e416eELSA-2023-12326ol6_x86_64_latest_archive
openssl-devel-1.0.0-10.el6_1.5.x86_64.rpm41090fec2e283141d0b80f0a0f62747432643239f9824c232a66242db1211905ELSA-2023-12326ol6_u1_x86_64_patch
openssl-devel-1.0.0-10.el6_1.5.x86_64.rpm41090fec2e283141d0b80f0a0f62747432643239f9824c232a66242db1211905ELSA-2023-12326ol6_x86_64_latest_archive
openssl-perl-1.0.0-10.el6_1.5.x86_64.rpm10cb162c8a5df3b7b31c450d388386dc3334d70c271b3b30ff9d2b48c648b82fELSA-2023-12326ol6_u1_x86_64_patch
openssl-perl-1.0.0-10.el6_1.5.x86_64.rpm10cb162c8a5df3b7b31c450d388386dc3334d70c271b3b30ff9d2b48c648b82fELSA-2023-12326ol6_x86_64_latest_archive
openssl-static-1.0.0-10.el6_1.5.x86_64.rpm4abc9478a0ef2836a3c976108b86c1c4525b119f1db467d61e6b80544f664cd3ELSA-2023-12326ol6_u1_x86_64_patch
openssl-static-1.0.0-10.el6_1.5.x86_64.rpm4abc9478a0ef2836a3c976108b86c1c4525b119f1db467d61e6b80544f664cd3ELSA-2023-12326ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete