OVMSA-2016-0071

OVMSA-2016-0071 - openssl security update

Type:SECURITY
Severity:NA
Release Date:2016-06-20

Description


[0.9.8e-39.0.1]
- To disable SSLv2 client connections create the file
/etc/sysconfig/openssl-ssl-client-kill-sslv2 (John Haxby) [orabug 21673934]
- Backport openssl 08-Jan-2015 security fixes (John Haxby) [orabug 20409893]
- fix CVE-2014-3570 - Bignum squaring may produce incorrect results
- fix CVE-2014-3571 - DTLS segmentation fault in dtls1_get_record
- fix CVE-2014-3572 - ECDHE silently downgrades to ECDH [Client]

[0.9.8e-39]
- fix CVE-2016-0797 - heap corruption in BN_hex2bn and BN_dec2bn

[0.9.8e-38]
- fix CVE-2015-3197 - SSLv2 ciphersuite enforcement
- disable SSLv2 in the generic TLS method (can be reenabled
by setting environment variable OPENSSL_ENABLE_SSL2)

[0.9.8e-37]
- fix CVE-2015-3195 - X509_ATTRIBUTE memory leak


Related CVEs


CVE-2015-3195
CVE-2015-3197
CVE-2016-0797
CVE-2016-0800

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3.2 (x86_64) openssl-0.9.8e-39.0.1.el5_11.src.rpm7cbebfd578b7c45962b8a13461669bd1OVMSA-2021-0011
openssl-0.9.8e-39.0.1.el5_11.i686.rpmb6203196f3c4d8d6d82ba6ea8f2d1bdfOVMSA-2021-0011
openssl-0.9.8e-39.0.1.el5_11.x86_64.rpm57b4241ccbb6c7f15163fae742f1ce70OVMSA-2021-0011



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete