Linux Security
Linux Security
Linux Security

RedHat: RHSA-2021-1131:01 Important: openssl security update

Date 07 Apr 2021
121
Posted By LinuxSecurity Advisories
An update for openssl is now available for Red Hat Enterprise Linux 8.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: openssl security update
Advisory ID:       RHSA-2021:1131-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:1131
Issue date:        2021-04-07
CVE Names:         CVE-2021-3449 
=====================================================================

1. Summary:

An update for openssl is now available for Red Hat Enterprise Linux 8.1
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux BaseOS EUS (v. 8.1) - aarch64, ppc64le, s390x, x86_64

3. Description:

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and
Transport Layer Security (TLS) protocols, as well as a full-strength
general-purpose cryptography library.

Security Fix(es):

* openssl: NULL pointer dereference in signature_algorithms processing
(CVE-2021-3449)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

For the update to take effect, all services linked to the OpenSSL library
must be restarted, or the system rebooted.

5. Bugs fixed (https://bugzilla.redhat.com/):

1941554 - CVE-2021-3449 openssl: NULL pointer dereference in signature_algorithms processing

6. Package List:

Red Hat Enterprise Linux BaseOS EUS (v. 8.1):

Source:
openssl-1.1.1c-5.el8_1.src.rpm

aarch64:
openssl-1.1.1c-5.el8_1.aarch64.rpm
openssl-debuginfo-1.1.1c-5.el8_1.aarch64.rpm
openssl-debugsource-1.1.1c-5.el8_1.aarch64.rpm
openssl-devel-1.1.1c-5.el8_1.aarch64.rpm
openssl-libs-1.1.1c-5.el8_1.aarch64.rpm
openssl-libs-debuginfo-1.1.1c-5.el8_1.aarch64.rpm
openssl-perl-1.1.1c-5.el8_1.aarch64.rpm

ppc64le:
openssl-1.1.1c-5.el8_1.ppc64le.rpm
openssl-debuginfo-1.1.1c-5.el8_1.ppc64le.rpm
openssl-debugsource-1.1.1c-5.el8_1.ppc64le.rpm
openssl-devel-1.1.1c-5.el8_1.ppc64le.rpm
openssl-libs-1.1.1c-5.el8_1.ppc64le.rpm
openssl-libs-debuginfo-1.1.1c-5.el8_1.ppc64le.rpm
openssl-perl-1.1.1c-5.el8_1.ppc64le.rpm

s390x:
openssl-1.1.1c-5.el8_1.s390x.rpm
openssl-debuginfo-1.1.1c-5.el8_1.s390x.rpm
openssl-debugsource-1.1.1c-5.el8_1.s390x.rpm
openssl-devel-1.1.1c-5.el8_1.s390x.rpm
openssl-libs-1.1.1c-5.el8_1.s390x.rpm
openssl-libs-debuginfo-1.1.1c-5.el8_1.s390x.rpm
openssl-perl-1.1.1c-5.el8_1.s390x.rpm

x86_64:
openssl-1.1.1c-5.el8_1.x86_64.rpm
openssl-debuginfo-1.1.1c-5.el8_1.i686.rpm
openssl-debuginfo-1.1.1c-5.el8_1.x86_64.rpm
openssl-debugsource-1.1.1c-5.el8_1.i686.rpm
openssl-debugsource-1.1.1c-5.el8_1.x86_64.rpm
openssl-devel-1.1.1c-5.el8_1.i686.rpm
openssl-devel-1.1.1c-5.el8_1.x86_64.rpm
openssl-libs-1.1.1c-5.el8_1.i686.rpm
openssl-libs-1.1.1c-5.el8_1.x86_64.rpm
openssl-libs-debuginfo-1.1.1c-5.el8_1.i686.rpm
openssl-libs-debuginfo-1.1.1c-5.el8_1.x86_64.rpm
openssl-perl-1.1.1c-5.el8_1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-3449
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=zxJQ
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
This email address is being protected from spambots. You need JavaScript enabled to view it.
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Advisories

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"42","type":"x","order":"1","pct":84,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"4","type":"x","order":"2","pct":8,"resources":[]},{"id":"181","title":"Hardly ever","votes":"4","type":"x","order":"3","pct":8,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.