OVMSA-2016-0086

OVMSA-2016-0086 - openssl security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2016-06-22

Description


[0.9.8e-40.0.2]
- CVE-2016-0799 - Fix memory issues in BIO_*printf functions
- CVE-2016-2105 - Avoid overflow in EVP_EncodeUpdate
- CVE-2016-2106 - Fix encrypt overflow
- CVE-2016-2109 - Harden ASN.1 BIO handling of large amounts of data.

[0.9.8e-40.0.1]
- To disable SSLv2 client connections create the file
/etc/sysconfig/openssl-ssl-client-kill-sslv2 (John Haxby) [orabug 21673934]
- Backport openssl 08-Jan-2015 security fixes (John Haxby) [orabug 20409893]
- fix CVE-2014-3570 - Bignum squaring may produce incorrect results
- fix CVE-2014-3571 - DTLS segmentation fault in dtls1_get_record
- fix CVE-2014-3572 - ECDHE silently downgrades to ECDH [Client]

[0.9.8e-40]
- fix CVE-2016-2108 - memory corruption in ASN.1 encoder


Related CVEs


CVE-2016-0799
CVE-2016-2105
CVE-2016-2106
CVE-2016-2109

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3.2 (x86_64) openssl-0.9.8e-40.0.2.el5_11.src.rpm905fac90828448f2abda7677aa2b33bcOVMSA-2021-0011
openssl-0.9.8e-40.0.2.el5_11.i686.rpmd267a14a3165cda5dabca281ea632fffOVMSA-2021-0011
openssl-0.9.8e-40.0.2.el5_11.x86_64.rpmdd0707f61a136a5d75db59db4bb76f6bOVMSA-2021-0011



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete