ELSA-2012-0518

ELSA-2012-0518 - openssl security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2012-04-25

Description


openssl:
[1.0.0-20.4]
- fix for CVE-2012-2110 - memory corruption in asn1_d2i_read_bio() (#814185)

openssl098e:
[0.9.8e-17.el6_2.2]
- Updated the description

[0.9.8e-17.2]
- fix for CVE-2012-2110 - memory corruption in asn1_d2i_read_bio() (#814185)


Related CVEs


CVE-2012-2110

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 5 (i386) openssl-0.9.8e-22.el5_8.3.src.rpmfe854e03f8da10fb43c5023250dbf3dfELEA-2017-1391
openssl097a-0.9.7a-11.el5_8.2.src.rpma201bbba06e1305a266568090e248158ELSA-2014-0626
openssl-0.9.8e-22.el5_8.3.i386.rpm3cf68667aeb6b9e38e25314366ded179ELEA-2017-1391
openssl-0.9.8e-22.el5_8.3.i686.rpm87258d05808aafea6e56186663314251ELEA-2017-1391
openssl-devel-0.9.8e-22.el5_8.3.i386.rpmfac4ee389169adea39601c801f7f7c7eELEA-2017-1391
openssl-perl-0.9.8e-22.el5_8.3.i386.rpm2193b78a606c8ceceb7d45adab212397ELEA-2017-1391
openssl097a-0.9.7a-11.el5_8.2.i386.rpm19932ce71be989914b9a03ad74c9557bELSA-2014-0626
Oracle Linux 5 (ia64) openssl-0.9.8e-22.el5_8.3.src.rpmfe854e03f8da10fb43c5023250dbf3dfELEA-2017-1391
openssl097a-0.9.7a-11.el5_8.2.src.rpma201bbba06e1305a266568090e248158ELSA-2014-0626
openssl-0.9.8e-22.el5_8.3.i686.rpm87258d05808aafea6e56186663314251ELEA-2017-1391
openssl-0.9.8e-22.el5_8.3.ia64.rpm1814eb8f6ee5e634b71eabbf2fee3c57ELEA-2017-1391
openssl-devel-0.9.8e-22.el5_8.3.ia64.rpmeba9cd54582b0c23993219aecc65957cELEA-2017-1391
openssl-perl-0.9.8e-22.el5_8.3.ia64.rpm029ace60bd3d0d27bb4b1e5a77165077ELEA-2017-1391
openssl097a-0.9.7a-11.el5_8.2.i386.rpm19932ce71be989914b9a03ad74c9557bELSA-2014-0626
openssl097a-0.9.7a-11.el5_8.2.ia64.rpm500655fddcd791147526e49e455b1d21ELSA-2014-0626
Oracle Linux 5 (x86_64) openssl-0.9.8e-22.el5_8.3.src.rpmfe854e03f8da10fb43c5023250dbf3dfELEA-2017-1391
openssl097a-0.9.7a-11.el5_8.2.src.rpma201bbba06e1305a266568090e248158ELSA-2014-0626
openssl-0.9.8e-22.el5_8.3.i686.rpm87258d05808aafea6e56186663314251ELEA-2017-1391
openssl-0.9.8e-22.el5_8.3.x86_64.rpm3ff6654c807a3da0a20f6bba9c694660ELEA-2017-1391
openssl-devel-0.9.8e-22.el5_8.3.i386.rpmfac4ee389169adea39601c801f7f7c7eELEA-2017-1391
openssl-devel-0.9.8e-22.el5_8.3.x86_64.rpma9f043c0ef738c354bd87fbf71a17b3dELEA-2017-1391
openssl-perl-0.9.8e-22.el5_8.3.x86_64.rpm7b6ff4f20b6c65059ae5a3af2d042ffeELEA-2017-1391
openssl097a-0.9.7a-11.el5_8.2.i386.rpm19932ce71be989914b9a03ad74c9557bELSA-2014-0626
openssl097a-0.9.7a-11.el5_8.2.x86_64.rpm6e960fae6cd271d25a3540c2e0f150eaELSA-2014-0626
Oracle Linux 6 (i386) openssl-1.0.0-20.el6_2.4.src.rpm4aa59780fbeeb93cb3eb41fdc4126dd7ELSA-2021-9150
openssl098e-0.9.8e-17.0.1.el6_2.2.src.rpm6f0d454b103218e8fa235fd8e7b4994fELSA-2016-0372
openssl-1.0.0-20.el6_2.4.i686.rpm313815079ee574f1ceab399fc6ca7915ELSA-2021-9150
openssl-devel-1.0.0-20.el6_2.4.i686.rpm4dec3649f7a3f01542c54553599059fcELSA-2021-9150
openssl-perl-1.0.0-20.el6_2.4.i686.rpm5e5f5886594112941b9a71ca97f22fe9ELSA-2021-9150
openssl-static-1.0.0-20.el6_2.4.i686.rpm845bab648d5f3fa4f81822c7fb57a9ccELSA-2021-9150
openssl098e-0.9.8e-17.0.1.el6_2.2.i686.rpm9103b0febc1e09d11976b8e2ba539125ELSA-2016-0372
Oracle Linux 6 (x86_64) openssl-1.0.0-20.el6_2.4.src.rpm4aa59780fbeeb93cb3eb41fdc4126dd7ELSA-2021-9150
openssl098e-0.9.8e-17.0.1.el6_2.2.src.rpm6f0d454b103218e8fa235fd8e7b4994fELSA-2016-0372
openssl-1.0.0-20.el6_2.4.i686.rpm313815079ee574f1ceab399fc6ca7915ELSA-2021-9150
openssl-1.0.0-20.el6_2.4.x86_64.rpmece531469302088ac577db14f311339eELSA-2021-9150
openssl-devel-1.0.0-20.el6_2.4.i686.rpm4dec3649f7a3f01542c54553599059fcELSA-2021-9150
openssl-devel-1.0.0-20.el6_2.4.x86_64.rpmfe5c5490e119443d79fad1110fce702dELSA-2021-9150
openssl-perl-1.0.0-20.el6_2.4.x86_64.rpm27a2b8df36bf7ecd83b4eb2e748cb68fELSA-2021-9150
openssl-static-1.0.0-20.el6_2.4.x86_64.rpm2b9abd4c221aee130ce5b9baaf77c3fbELSA-2021-9150
openssl098e-0.9.8e-17.0.1.el6_2.2.i686.rpm9103b0febc1e09d11976b8e2ba539125ELSA-2016-0372
openssl098e-0.9.8e-17.0.1.el6_2.2.x86_64.rpm5ade14c140eb7bf55d236af7181fa605ELSA-2016-0372



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete