ELSA-2016-3576

ELSA-2016-3576 - openssl security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2016-06-21

Description


[0.9.8e-40.0.2]
- CVE-2016-0799 - Fix memory issues in BIO_*printf functions
- CVE-2016-2105 - Avoid overflow in EVP_EncodeUpdate
- CVE-2016-2106 - Fix encrypt overflow
- CVE-2016-2109 - Harden ASN.1 BIO handling of large amounts of data.


Related CVEs


CVE-2016-0799
CVE-2016-2105
CVE-2016-2106
CVE-2016-2109

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 5 (i386) openssl-0.9.8e-40.0.2.el5_11.src.rpm905fac90828448f2abda7677aa2b33bcELEA-2017-1391
openssl-0.9.8e-40.0.2.el5_11.i386.rpmc328745c1f3ff2204bfbc2b76e3a59aaELEA-2017-1391
openssl-0.9.8e-40.0.2.el5_11.i686.rpmd267a14a3165cda5dabca281ea632fffELEA-2017-1391
openssl-devel-0.9.8e-40.0.2.el5_11.i386.rpmeabc8f54086bebf5a487957eefabd3b1ELEA-2017-1391
openssl-perl-0.9.8e-40.0.2.el5_11.i386.rpm6ddabe9c38edf3bede2ed1db24d0201aELEA-2017-1391
Oracle Linux 5 (ia64) openssl-0.9.8e-40.0.2.el5_11.src.rpm905fac90828448f2abda7677aa2b33bcELEA-2017-1391
openssl-0.9.8e-40.0.2.el5_11.i686.rpmd267a14a3165cda5dabca281ea632fffELEA-2017-1391
openssl-0.9.8e-40.0.2.el5_11.ia64.rpm7e486c7bbd5f5c7e8e1bbe293452ef78ELEA-2017-1391
openssl-devel-0.9.8e-40.0.2.el5_11.ia64.rpm8ac371256f17870ca2cc011f68e5d8fcELEA-2017-1391
openssl-perl-0.9.8e-40.0.2.el5_11.ia64.rpm6fe5735983c4b88129540caf670846ecELEA-2017-1391
Oracle Linux 5 (x86_64) openssl-0.9.8e-40.0.2.el5_11.src.rpm905fac90828448f2abda7677aa2b33bcELEA-2017-1391
openssl-0.9.8e-40.0.2.el5_11.i686.rpmd267a14a3165cda5dabca281ea632fffELEA-2017-1391
openssl-0.9.8e-40.0.2.el5_11.x86_64.rpmdd0707f61a136a5d75db59db4bb76f6bELEA-2017-1391
openssl-devel-0.9.8e-40.0.2.el5_11.i386.rpmeabc8f54086bebf5a487957eefabd3b1ELEA-2017-1391
openssl-devel-0.9.8e-40.0.2.el5_11.x86_64.rpm5bad6651bdc9dcd64c7f3008c63a0eefELEA-2017-1391
openssl-perl-0.9.8e-40.0.2.el5_11.x86_64.rpm997f8e0d4b0aed2edd918285a92e2d87ELEA-2017-1391



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete