ELSA-2012-0060

ELSA-2012-0060 - openssl security update

Type:SECURITY
Severity:MODERATE
Release Date:2012-01-24

Description


[0.9.8e-20.1]
- fix for CVE-2011-4108 & CVE-2012-0050 - DTLS plaintext recovery
vulnerability and additional DTLS fixes (#771770)
- fix for CVE-2011-4109 - double free in policy checks (#771771)
- fix for CVE-2011-4576 - uninitialized SSL 3.0 padding (#771775)
- fix for CVE-2011-4619 - SGC restart DoS attack (#771780)


Related CVEs


CVE-2011-4108
CVE-2011-4109
CVE-2011-4576
CVE-2011-4619

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 5 (i386) openssl-0.9.8e-20.el5_7.1.src.rpm120f6baf76a62a6785eb623ba94cc4e8ELEA-2017-1391
openssl-0.9.8e-20.el5_7.1.i386.rpm1e06cc7a94b76f48af36fe3da2cb0086ELEA-2017-1391
openssl-0.9.8e-20.el5_7.1.i686.rpme9b27370aa69ae1a0a4d8330f2d19968ELEA-2017-1391
openssl-devel-0.9.8e-20.el5_7.1.i386.rpm95019579f49d6d35bfe22dbf4dc57aabELEA-2017-1391
openssl-perl-0.9.8e-20.el5_7.1.i386.rpmf78aadfc134a570f95ef175101bd09fcELEA-2017-1391
Oracle Linux 5 (ia64) openssl-0.9.8e-20.el5_7.1.src.rpm120f6baf76a62a6785eb623ba94cc4e8ELEA-2017-1391
openssl-0.9.8e-20.el5_7.1.i686.rpme9b27370aa69ae1a0a4d8330f2d19968ELEA-2017-1391
openssl-0.9.8e-20.el5_7.1.ia64.rpm1be21ac04cf366c68d287ad87d928cd5ELEA-2017-1391
openssl-devel-0.9.8e-20.el5_7.1.ia64.rpmc7c81e10747326bd0323c1c496be67e9ELEA-2017-1391
openssl-perl-0.9.8e-20.el5_7.1.ia64.rpm8b1bef08c4795c887384631bf719a346ELEA-2017-1391
Oracle Linux 5 (x86_64) openssl-0.9.8e-20.el5_7.1.src.rpm120f6baf76a62a6785eb623ba94cc4e8ELEA-2017-1391
openssl-0.9.8e-20.el5_7.1.i686.rpme9b27370aa69ae1a0a4d8330f2d19968ELEA-2017-1391
openssl-0.9.8e-20.el5_7.1.x86_64.rpm8b357ec648e09b7c50e6281a92be38daELEA-2017-1391
openssl-devel-0.9.8e-20.el5_7.1.i386.rpm95019579f49d6d35bfe22dbf4dc57aabELEA-2017-1391
openssl-devel-0.9.8e-20.el5_7.1.x86_64.rpm80b09ae48ee1f56d54dc6995bbc37fb4ELEA-2017-1391
openssl-perl-0.9.8e-20.el5_7.1.x86_64.rpme6f9652befee592c18b3c02ebaa3324cELEA-2017-1391



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete