Описание
ELSA-2010-0979: openssl security update (MODERATE)
[1.0.0-4.2]
- disable code for SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG - CVE-2010-3864 (#649304)
[1.0.0-4.1]
- fix race in extension parsing code - CVE-2010-3864 (#649304)
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
openssl
1.0.0-4.el6_0.2
openssl-devel
1.0.0-4.el6_0.2
openssl-perl
1.0.0-4.el6_0.2
openssl-static
1.0.0-4.el6_0.2
Oracle Linux i686
openssl
1.0.0-4.el6_0.2
openssl-devel
1.0.0-4.el6_0.2
openssl-perl
1.0.0-4.el6_0.2
openssl-static
1.0.0-4.el6_0.2
Связанные CVE
Связанные уязвимости
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9 ...