Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2014-10-16 |
[1.0.1e-30.2]
- fix CVE-2014-3567 - memory leak when handling session tickets
- fix CVE-2014-3513 - memory leak in srtp support
- add support for fallback SCSV to partially mitigate CVE-2014-3566
(padding attack on SSL3)
[1.0.1e-30]
- add ECC TLS extensions to DTLS (#1119800)
[1.0.1e-29]
- fix CVE-2014-3505 - doublefree in DTLS packet processing
- fix CVE-2014-3506 - avoid memory exhaustion in DTLS
- fix CVE-2014-3507 - avoid memory leak in DTLS
- fix CVE-2014-3508 - fix OID handling to avoid information leak
- fix CVE-2014-3509 - fix race condition when parsing server hello
- fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS
- fix CVE-2014-3511 - disallow protocol downgrade via fragmentation
[1.0.1e-28]
- fix CVE-2014-0224 fix that broke EAP-FAST session resumption support
[1.0.1e-26]
- drop EXPORT, RC2, and DES from the default cipher list (#1057520)
- print ephemeral key size negotiated in TLS handshake (#1057715)
- do not include ECC ciphersuites in SSLv2 client hello (#1090952)
- properly detect encryption failure in BIO (#1100819)
- fail on hmac integrity check if the .hmac file is empty (#1105567)
- FIPS mode: make the limitations on DSA, DH, and RSA keygen
length enforced only if OPENSSL_ENFORCE_MODULUS_BITS environment
variable is set
[1.0.1e-25]
- fix CVE-2010-5298 - possible use of memory after free
- fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment
- fix CVE-2014-0198 - possible NULL pointer dereference
- fix CVE-2014-0221 - DoS from invalid DTLS handshake packet
- fix CVE-2014-0224 - SSL/TLS MITM vulnerability
- fix CVE-2014-3470 - client-side DoS when using anonymous ECDH
[1.0.1e-24]
- add back support for secp521r1 EC curve
[1.0.1e-23]
- fix CVE-2014-0160 - information disclosure in TLS heartbeat extension
[1.0.1e-22]
- use 2048 bit RSA key in FIPS selftests
[1.0.1e-21]
- add DH_compute_key_padded needed for FIPS CAVS testing
- make 3des strength to be 128 bits instead of 168 (#1056616)
- FIPS mode: do not generate DSA keys and DH parameters < 2048 bits
- FIPS mode: use approved RSA keygen (allows only 2048 and 3072 bit keys)
- FIPS mode: add DH selftest
- FIPS mode: reseed DRBG properly on RAND_add()
- FIPS mode: add RSA encrypt/decrypt selftest
- FIPS mode: add hard limit for 2^32 GCM block encryptions with the same key
- use the key length from configuration file if req -newkey rsa is invoked
[1.0.1e-20]
- fix CVE-2013-4353 - Invalid TLS handshake crash
[1.0.1e-19]
- fix CVE-2013-6450 - possible MiTM attack on DTLS1
[1.0.1e-18]
- fix CVE-2013-6449 - crash when version in SSL structure is incorrect
[1.0.1e-17]
- add back some no-op symbols that were inadvertently dropped
CVE-2014-3513 |
CVE-2014-3567 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (i386) | openssl-1.0.1e-30.el6_6.2.src.rpm | 4796f0a87a27b7098571504fe346dac9 | ELSA-2021-9150 |
openssl-1.0.1e-30.el6_6.2.i686.rpm | f9833ae63524adabe108c68c9424866a | ELSA-2021-9150 | |
openssl-devel-1.0.1e-30.el6_6.2.i686.rpm | 03df7897011e60ec2f367653f3b40f90 | ELSA-2021-9150 | |
openssl-perl-1.0.1e-30.el6_6.2.i686.rpm | c87242d2643447cf38661e9fe134a01a | ELSA-2021-9150 | |
openssl-static-1.0.1e-30.el6_6.2.i686.rpm | 6a5d63a3944eda6ef3c2e0be56480fc4 | ELSA-2021-9150 | |
Oracle Linux 6 (x86_64) | openssl-1.0.1e-30.el6_6.2.src.rpm | 4796f0a87a27b7098571504fe346dac9 | ELSA-2021-9150 |
openssl-1.0.1e-30.el6_6.2.i686.rpm | f9833ae63524adabe108c68c9424866a | ELSA-2021-9150 | |
openssl-1.0.1e-30.el6_6.2.x86_64.rpm | 85978f0c6b6a70ae536fb5e1dc44521e | ELSA-2021-9150 | |
openssl-devel-1.0.1e-30.el6_6.2.i686.rpm | 03df7897011e60ec2f367653f3b40f90 | ELSA-2021-9150 | |
openssl-devel-1.0.1e-30.el6_6.2.x86_64.rpm | 7eadea8d663e77e821cb4d6317808a2b | ELSA-2021-9150 | |
openssl-perl-1.0.1e-30.el6_6.2.x86_64.rpm | a7a280e28b3bac74d3cf5b0f21e543f4 | ELSA-2021-9150 | |
openssl-static-1.0.1e-30.el6_6.2.x86_64.rpm | 021e17c332f6dac5699e1c1480fe8ac9 | ELSA-2021-9150 | |
Oracle Linux 7 (x86_64) | openssl-1.0.1e-34.el7_0.6.src.rpm | 3d13ba8adc39539af921850015d89f2e | ELSA-2017-3518 |
openssl-1.0.1e-34.el7_0.6.x86_64.rpm | af32a10c56c60066b7b3d5a4018d4a44 | ELSA-2017-3518 | |
openssl-devel-1.0.1e-34.el7_0.6.i686.rpm | 798d694f0d4046671c81687145f154c2 | ELSA-2017-3518 | |
openssl-devel-1.0.1e-34.el7_0.6.x86_64.rpm | 9ca6479c062d3800c8e164db35024d22 | ELSA-2017-3518 | |
openssl-libs-1.0.1e-34.el7_0.6.i686.rpm | 3f63029375b997ecc1188bb7a418de2f | ELSA-2017-3518 | |
openssl-libs-1.0.1e-34.el7_0.6.x86_64.rpm | 0428a7f8d5cddfa36a3355d6754952cd | ELSA-2017-3518 | |
openssl-perl-1.0.1e-34.el7_0.6.x86_64.rpm | da471999ebba1fdc99c9b188bbbf3c7c | ELSA-2017-3518 | |
openssl-static-1.0.1e-34.el7_0.6.i686.rpm | 2c05af96d346670080805c69cb21aa87 | ELSA-2017-3518 | |
openssl-static-1.0.1e-34.el7_0.6.x86_64.rpm | 5ecdc2341fc74641b62aec4517229f1e | ELSA-2017-3518 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team