ELSA-2012-0059

ELSA-2012-0059 - openssl security update

Type:SECURITY
Impact:MODERATE
Release Date:2012-01-24

Description


[1.0.0-20.1]
- fix for CVE-2011-4108 & CVE-2012-0050 - DTLS plaintext recovery
vulnerability and additional DTLS fixes (#771770)
- fix for CVE-2011-4576 - uninitialized SSL 3.0 padding (#771775)
- fix for CVE-2011-4577 - possible DoS through malformed RFC 3779 data (#771778)
- fix for CVE-2011-4619 - SGC restart DoS attack (#771780)


Related CVEs


CVE-2011-4577
CVE-2011-4108
CVE-2011-4576
CVE-2011-4619

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) openssl-1.0.0-20.el6_2.1.src.rpm2328116b9857b14671f42e558da43b6d66f622d68ebab4c45e591cba681839f2ELSA-2023-12326ol6_i386_latest_archive
openssl-1.0.0-20.el6_2.1.src.rpm2328116b9857b14671f42e558da43b6d66f622d68ebab4c45e591cba681839f2ELSA-2023-12326ol6_u2_i386_patch
openssl-1.0.0-20.el6_2.1.i686.rpm60efa33f279b6150e90638e98118db12efec45adfb34bafa9808451510ab85f9ELSA-2023-12326ol6_i386_latest_archive
openssl-1.0.0-20.el6_2.1.i686.rpm60efa33f279b6150e90638e98118db12efec45adfb34bafa9808451510ab85f9ELSA-2023-12326ol6_u2_i386_patch
openssl-devel-1.0.0-20.el6_2.1.i686.rpmf6e8fbc8be894b5fa5ee8e3d8cf27bba528511f0fabbee64a6411072521308aeELSA-2023-12326ol6_i386_latest_archive
openssl-devel-1.0.0-20.el6_2.1.i686.rpmf6e8fbc8be894b5fa5ee8e3d8cf27bba528511f0fabbee64a6411072521308aeELSA-2023-12326ol6_u2_i386_patch
openssl-perl-1.0.0-20.el6_2.1.i686.rpm28aecd98cb46194d518ddd5d20293867ecbbc00d9c5a2f50bf16cee6ac32dc20ELSA-2023-12326ol6_i386_latest_archive
openssl-perl-1.0.0-20.el6_2.1.i686.rpm28aecd98cb46194d518ddd5d20293867ecbbc00d9c5a2f50bf16cee6ac32dc20ELSA-2023-12326ol6_u2_i386_patch
openssl-static-1.0.0-20.el6_2.1.i686.rpm2e4721e08d4e566eb0c78dc7731feb7c48368d78cc5e01c47bc6b8d782e63fd1ELSA-2023-12326ol6_i386_latest_archive
openssl-static-1.0.0-20.el6_2.1.i686.rpm2e4721e08d4e566eb0c78dc7731feb7c48368d78cc5e01c47bc6b8d782e63fd1ELSA-2023-12326ol6_u2_i386_patch
Oracle Linux 6 (x86_64) openssl-1.0.0-20.el6_2.1.src.rpm2328116b9857b14671f42e558da43b6d66f622d68ebab4c45e591cba681839f2ELSA-2023-12326ol6_u2_x86_64_patch
openssl-1.0.0-20.el6_2.1.src.rpm2328116b9857b14671f42e558da43b6d66f622d68ebab4c45e591cba681839f2ELSA-2023-12326ol6_x86_64_latest_archive
openssl-1.0.0-20.el6_2.1.i686.rpm60efa33f279b6150e90638e98118db12efec45adfb34bafa9808451510ab85f9ELSA-2023-12326ol6_u2_x86_64_patch
openssl-1.0.0-20.el6_2.1.i686.rpm60efa33f279b6150e90638e98118db12efec45adfb34bafa9808451510ab85f9ELSA-2023-12326ol6_x86_64_latest_archive
openssl-1.0.0-20.el6_2.1.x86_64.rpmeaf963ebaef52a89a245bb4c6db4b112a4d58b2db7d6f129beb9403cb35e49eeELSA-2023-12326ol6_u2_x86_64_patch
openssl-1.0.0-20.el6_2.1.x86_64.rpmeaf963ebaef52a89a245bb4c6db4b112a4d58b2db7d6f129beb9403cb35e49eeELSA-2023-12326ol6_x86_64_latest_archive
openssl-devel-1.0.0-20.el6_2.1.i686.rpmf6e8fbc8be894b5fa5ee8e3d8cf27bba528511f0fabbee64a6411072521308aeELSA-2023-12326ol6_u2_x86_64_patch
openssl-devel-1.0.0-20.el6_2.1.i686.rpmf6e8fbc8be894b5fa5ee8e3d8cf27bba528511f0fabbee64a6411072521308aeELSA-2023-12326ol6_x86_64_latest_archive
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpmf88397b748285280389a8c4b5e9476a7b2bd5c56b3766e6e97095923d049c807ELSA-2023-12326ol6_u2_x86_64_patch
openssl-devel-1.0.0-20.el6_2.1.x86_64.rpmf88397b748285280389a8c4b5e9476a7b2bd5c56b3766e6e97095923d049c807ELSA-2023-12326ol6_x86_64_latest_archive
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm5c8226314006e33fc73611ec0eda12eeebea70e2be9ab0496e52e51938490f22ELSA-2023-12326ol6_u2_x86_64_patch
openssl-perl-1.0.0-20.el6_2.1.x86_64.rpm5c8226314006e33fc73611ec0eda12eeebea70e2be9ab0496e52e51938490f22ELSA-2023-12326ol6_x86_64_latest_archive
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm6a0e923965b502af5f05cb83223f3f8b26b3936a796dceaa9d35cef90a947f4dELSA-2023-12326ol6_u2_x86_64_patch
openssl-static-1.0.0-20.el6_2.1.x86_64.rpm6a0e923965b502af5f05cb83223f3f8b26b3936a796dceaa9d35cef90a947f4dELSA-2023-12326ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete