OVMSA-2016-0086

OVMSA-2016-0086 - openssl security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2016-06-22

Description


[0.9.8e-40.0.2]
- CVE-2016-0799 - Fix memory issues in BIO_*printf functions
- CVE-2016-2105 - Avoid overflow in EVP_EncodeUpdate
- CVE-2016-2106 - Fix encrypt overflow
- CVE-2016-2109 - Harden ASN.1 BIO handling of large amounts of data.

[0.9.8e-40.0.1]
- To disable SSLv2 client connections create the file
/etc/sysconfig/openssl-ssl-client-kill-sslv2 (John Haxby) [orabug 21673934]
- Backport openssl 08-Jan-2015 security fixes (John Haxby) [orabug 20409893]
- fix CVE-2014-3570 - Bignum squaring may produce incorrect results
- fix CVE-2014-3571 - DTLS segmentation fault in dtls1_get_record
- fix CVE-2014-3572 - ECDHE silently downgrades to ECDH [Client]

[0.9.8e-40]
- fix CVE-2016-2108 - memory corruption in ASN.1 encoder


Related CVEs


CVE-2016-2106
CVE-2016-2105
CVE-2016-2109
CVE-2016-0799

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3.2 (x86_64) openssl-0.9.8e-40.0.2.el5_11.src.rpm12b20d035a543d811630705b3aa52f60072b067f89a23d56ed2bca797635846dOVMSA-2023-0013ovm3_3.2.1_x86_64_patch
openssl-0.9.8e-40.0.2.el5_11.i686.rpmb505f8f0254a1ee976c1ab0d95289642e31b20c49c94be62cb40e57a44f89cf3OVMSA-2023-0013ovm3_3.2.1_x86_64_patch
openssl-0.9.8e-40.0.2.el5_11.x86_64.rpmde6f4c338900715d0a2d494f095b75a13f13db3372d6688872ec854c49c759c4OVMSA-2023-0013ovm3_3.2.1_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete