OVMSA-2016-0086 - openssl security update
Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2016-06-22 |
Description
[0.9.8e-40.0.2]
- CVE-2016-0799 - Fix memory issues in BIO_*printf functions
- CVE-2016-2105 - Avoid overflow in EVP_EncodeUpdate
- CVE-2016-2106 - Fix encrypt overflow
- CVE-2016-2109 - Harden ASN.1 BIO handling of large amounts of data.
[0.9.8e-40.0.1]
- To disable SSLv2 client connections create the file
/etc/sysconfig/openssl-ssl-client-kill-sslv2 (John Haxby) [orabug 21673934]
- Backport openssl 08-Jan-2015 security fixes (John Haxby) [orabug 20409893]
- fix CVE-2014-3570 - Bignum squaring may produce incorrect results
- fix CVE-2014-3571 - DTLS segmentation fault in dtls1_get_record
- fix CVE-2014-3572 - ECDHE silently downgrades to ECDH [Client]
[0.9.8e-40]
- fix CVE-2016-2108 - memory corruption in ASN.1 encoder
Related CVEs
Updated Packages
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
|
Oracle VM 3.2 (x86_64) | openssl-0.9.8e-40.0.2.el5_11.src.rpm | 12b20d035a543d811630705b3aa52f60072b067f89a23d56ed2bca797635846d | OVMSA-2023-0013 | ovm3_3.2.1_x86_64_patch |
| openssl-0.9.8e-40.0.2.el5_11.i686.rpm | b505f8f0254a1ee976c1ab0d95289642e31b20c49c94be62cb40e57a44f89cf3 | OVMSA-2023-0013 | ovm3_3.2.1_x86_64_patch |
| openssl-0.9.8e-40.0.2.el5_11.x86_64.rpm | de6f4c338900715d0a2d494f095b75a13f13db3372d6688872ec854c49c759c4 | OVMSA-2023-0013 | ovm3_3.2.1_x86_64_patch |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team