ELSA-2021-9151

ELSA-2021-9151 - openssl security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2021-04-01

Description


[1.1.1g-15]
- version bump

[1.1.1g-14]
- CVE-2021-3450 openssl: CA certificate check
bypass with X509_V_FLAG_X509_STRICT

[1.1.1g-13]
- Fix CVE-2021-3449 NULL pointer deref in signature_algorithms processing


Related CVEs


CVE-2021-3449
CVE-2021-3450

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 8 (aarch64) openssl-1.1.1g-15.ksplice1.el8_3.src.rpm8febf91c60da0824b34a386d0a42b610-
openssl-1.1.1g-15.ksplice1.el8_3.aarch64.rpm3b24b590f2e1e748d81b888af1f62053-
openssl-debugsource-1.1.1g-15.ksplice1.el8_3.aarch64.rpmc7dc43e4b1e9330f0774cb5f7752c587-
openssl-devel-1.1.1g-15.ksplice1.el8_3.aarch64.rpm9b7a7070552a90263a9ee0ada16348c9-
openssl-libs-1.1.1g-15.ksplice1.el8_3.aarch64.rpm031214573e1927a34ea26687c89f8d9d-
openssl-perl-1.1.1g-15.ksplice1.el8_3.aarch64.rpm9b6647cf17e170db352edb3acc5e8b60-
openssl-static-1.1.1g-15.ksplice1.el8_3.aarch64.rpm85d7579e6348e22cd52e7aa336374560-
Oracle Linux 8 (x86_64) openssl-1.1.1g-15.ksplice1.el8_3.src.rpm8febf91c60da0824b34a386d0a42b610-
openssl-1.1.1g-15.ksplice1.el8_3.x86_64.rpm72d2d6313dd15a0982356347582b66ad-
openssl-devel-1.1.1g-15.ksplice1.el8_3.i686.rpm0f45e09f518962210b367c254b1ae709-
openssl-devel-1.1.1g-15.ksplice1.el8_3.x86_64.rpm1b596431cd846926bafd4bcc97edfa38-
openssl-libs-1.1.1g-15.ksplice1.el8_3.i686.rpma77374d9eec4ad25cdb16cecd2d77d11-
openssl-libs-1.1.1g-15.ksplice1.el8_3.x86_64.rpmb42043e7a5500eb33fc27a1be453baa5-
openssl-perl-1.1.1g-15.ksplice1.el8_3.x86_64.rpm3f247caca6b5788de88045f267a954e0-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete