ELSA-2014-0376

ELSA-2014-0376 - openssl security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2014-04-07

Description


[1.0.1e-16.7]
- fix CVE-2014-0160 - information disclosure in TLS heartbeat extension


Related CVEs


CVE-2014-0160

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) openssl-1.0.1e-16.el6_5.7.src.rpmbecb35f611f4ddd8bd9880be160da9290503d22637c3a0be677d4b5487ac4ec2ELSA-2023-12326ol6_i386_latest_archive
openssl-1.0.1e-16.el6_5.7.src.rpmbecb35f611f4ddd8bd9880be160da9290503d22637c3a0be677d4b5487ac4ec2ELSA-2023-12326ol6_u5_i386_patch
openssl-1.0.1e-16.el6_5.7.i686.rpme6a70ed6e6bebb14c866b78439c71c16d4f73b1781dc8144243b084cf73956d0ELSA-2023-12326ol6_i386_latest_archive
openssl-1.0.1e-16.el6_5.7.i686.rpme6a70ed6e6bebb14c866b78439c71c16d4f73b1781dc8144243b084cf73956d0ELSA-2023-12326ol6_u5_i386_patch
openssl-devel-1.0.1e-16.el6_5.7.i686.rpm5abe851b2504bdd30596b133aca0a96afd70acb27454fe2cf69529f136183201ELSA-2023-12326ol6_i386_latest_archive
openssl-devel-1.0.1e-16.el6_5.7.i686.rpm5abe851b2504bdd30596b133aca0a96afd70acb27454fe2cf69529f136183201ELSA-2023-12326ol6_u5_i386_patch
openssl-perl-1.0.1e-16.el6_5.7.i686.rpm47312838f0c7a55d5eb306da7d2deac8b41c3666bb6f586a0cc4a02fd4a67379ELSA-2023-12326ol6_i386_latest_archive
openssl-perl-1.0.1e-16.el6_5.7.i686.rpm47312838f0c7a55d5eb306da7d2deac8b41c3666bb6f586a0cc4a02fd4a67379ELSA-2023-12326ol6_u5_i386_patch
openssl-static-1.0.1e-16.el6_5.7.i686.rpmf537d77cabe0742cce14a6b4e6f604912a86fd083542ab184a11c6db07e0e262ELSA-2023-12326ol6_i386_latest_archive
openssl-static-1.0.1e-16.el6_5.7.i686.rpmf537d77cabe0742cce14a6b4e6f604912a86fd083542ab184a11c6db07e0e262ELSA-2023-12326ol6_u5_i386_patch
Oracle Linux 6 (x86_64) openssl-1.0.1e-16.el6_5.7.src.rpmbecb35f611f4ddd8bd9880be160da9290503d22637c3a0be677d4b5487ac4ec2ELSA-2023-12326ol6_u5_x86_64_patch
openssl-1.0.1e-16.el6_5.7.src.rpmbecb35f611f4ddd8bd9880be160da9290503d22637c3a0be677d4b5487ac4ec2ELSA-2023-12326ol6_x86_64_latest_archive
openssl-1.0.1e-16.el6_5.7.i686.rpme6a70ed6e6bebb14c866b78439c71c16d4f73b1781dc8144243b084cf73956d0ELSA-2023-12326ol6_u5_x86_64_patch
openssl-1.0.1e-16.el6_5.7.i686.rpme6a70ed6e6bebb14c866b78439c71c16d4f73b1781dc8144243b084cf73956d0ELSA-2023-12326ol6_x86_64_latest_archive
openssl-1.0.1e-16.el6_5.7.x86_64.rpmd562984f4150f327120612a5dfa97c01a17c86e705f2b8d220fc4d670b2bb089ELSA-2023-12326ol6_u5_x86_64_patch
openssl-1.0.1e-16.el6_5.7.x86_64.rpmd562984f4150f327120612a5dfa97c01a17c86e705f2b8d220fc4d670b2bb089ELSA-2023-12326ol6_x86_64_latest_archive
openssl-devel-1.0.1e-16.el6_5.7.i686.rpm5abe851b2504bdd30596b133aca0a96afd70acb27454fe2cf69529f136183201ELSA-2023-12326ol6_u5_x86_64_patch
openssl-devel-1.0.1e-16.el6_5.7.i686.rpm5abe851b2504bdd30596b133aca0a96afd70acb27454fe2cf69529f136183201ELSA-2023-12326ol6_x86_64_latest_archive
openssl-devel-1.0.1e-16.el6_5.7.x86_64.rpmc3f2850852d4af798916175fc5b736d35fb53ed9466aa9b3d5074325582fb559ELSA-2023-12326ol6_u5_x86_64_patch
openssl-devel-1.0.1e-16.el6_5.7.x86_64.rpmc3f2850852d4af798916175fc5b736d35fb53ed9466aa9b3d5074325582fb559ELSA-2023-12326ol6_x86_64_latest_archive
openssl-perl-1.0.1e-16.el6_5.7.x86_64.rpm5fcb4defe2cba974294c9ddff1682b2a07b8c14eb349f2dbf229097c5ac2b349ELSA-2023-12326ol6_u5_x86_64_patch
openssl-perl-1.0.1e-16.el6_5.7.x86_64.rpm5fcb4defe2cba974294c9ddff1682b2a07b8c14eb349f2dbf229097c5ac2b349ELSA-2023-12326ol6_x86_64_latest_archive
openssl-static-1.0.1e-16.el6_5.7.x86_64.rpmc8bf1b862486618e89d1aa701382c386b830c5f2b28b73950d4d222d0d2a6171ELSA-2023-12326ol6_u5_x86_64_patch
openssl-static-1.0.1e-16.el6_5.7.x86_64.rpmc8bf1b862486618e89d1aa701382c386b830c5f2b28b73950d4d222d0d2a6171ELSA-2023-12326ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete