Oracle Linux Security Advisory ELSA-2016-1137

https://linux.oracle.com/errata/ELSA-2016-1137.html

The following updated rpms for Oracle Linux 5 have been uploaded to the 
Unbreakable Linux Network:

i386:
openssl-0.9.8e-40.0.1.el5_11.i386.rpm
openssl-0.9.8e-40.0.1.el5_11.i686.rpm
openssl-devel-0.9.8e-40.0.1.el5_11.i386.rpm
openssl-perl-0.9.8e-40.0.1.el5_11.i386.rpm

x86_64:
openssl-0.9.8e-40.0.1.el5_11.i686.rpm
openssl-0.9.8e-40.0.1.el5_11.x86_64.rpm
openssl-devel-0.9.8e-40.0.1.el5_11.i386.rpm
openssl-devel-0.9.8e-40.0.1.el5_11.x86_64.rpm
openssl-perl-0.9.8e-40.0.1.el5_11.x86_64.rpm

ia64:
openssl-0.9.8e-40.0.1.el5_11.i686.rpm
openssl-0.9.8e-40.0.1.el5_11.ia64.rpm
openssl-devel-0.9.8e-40.0.1.el5_11.ia64.rpm
openssl-perl-0.9.8e-40.0.1.el5_11.ia64.rpm


SRPMS:
https://oss.oracle.com:443/ol5/SRPMS-updates/openssl-0.9.8e-40.0.1.el5_11.src.rpm



Description of changes:

[0.9.8e-40.0.1]
- To disable SSLv2 client connections create the file
   /etc/sysconfig/openssl-ssl-client-kill-sslv2 (John Haxby) [orabug 
21673934]
- Backport openssl 08-Jan-2015 security fixes (John Haxby) [orabug 20409893]
- fix CVE-2014-3570 - Bignum squaring may produce incorrect results
- fix CVE-2014-3571 - DTLS segmentation fault in dtls1_get_record
- fix CVE-2014-3572 - ECDHE silently downgrades to ECDH [Client]

[0.9.8e-40]
- fix CVE-2016-2108 - memory corruption in ASN.1 encoder

Oracle5: ELSA-2016-1137: openssl Important Security Update

The following updated rpms for Oracle Linux 5 have been uploaded to the Unbreakable Linux Network:

Summary

[0.9.8e-40.0.1] - To disable SSLv2 client connections create the file /etc/sysconfig/openssl-ssl-client-kill-sslv2 (John Haxby) [orabug 21673934] - Backport openssl 08-Jan-2015 security fixes (John Haxby) [orabug 20409893] - fix CVE-2014-3570 - Bignum squaring may produce incorrect results - fix CVE-2014-3571 - DTLS segmentation fault in dtls1_get_record - fix CVE-2014-3572 - ECDHE silently downgrades to ECDH [Client] [0.9.8e-40] - fix CVE-2016-2108 - memory corruption in ASN.1 encoder

SRPMs

https://oss.oracle.com:443/ol5/SRPMS-updates/openssl-0.9.8e-40.0.1.el5_11.src.rpm

x86_64

openssl-0.9.8e-40.0.1.el5_11.i686.rpm openssl-0.9.8e-40.0.1.el5_11.x86_64.rpm openssl-devel-0.9.8e-40.0.1.el5_11.i386.rpm openssl-devel-0.9.8e-40.0.1.el5_11.x86_64.rpm openssl-perl-0.9.8e-40.0.1.el5_11.x86_64.rpm ia64: openssl-0.9.8e-40.0.1.el5_11.i686.rpm openssl-0.9.8e-40.0.1.el5_11.ia64.rpm openssl-devel-0.9.8e-40.0.1.el5_11.ia64.rpm openssl-perl-0.9.8e-40.0.1.el5_11.ia64.rpm

aarch64

i386

openssl-0.9.8e-40.0.1.el5_11.i386.rpm openssl-0.9.8e-40.0.1.el5_11.i686.rpm openssl-devel-0.9.8e-40.0.1.el5_11.i386.rpm openssl-perl-0.9.8e-40.0.1.el5_11.i386.rpm

Severity

Related News