Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-1652

Опубликовано: 16 окт. 2014
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2014-1652: openssl security update (IMPORTANT)

[1.0.1e-30.2]

  • fix CVE-2014-3567 - memory leak when handling session tickets
  • fix CVE-2014-3513 - memory leak in srtp support
  • add support for fallback SCSV to partially mitigate CVE-2014-3566 (padding attack on SSL3)

[1.0.1e-30]

  • add ECC TLS extensions to DTLS (#1119800)

[1.0.1e-29]

  • fix CVE-2014-3505 - doublefree in DTLS packet processing
  • fix CVE-2014-3506 - avoid memory exhaustion in DTLS
  • fix CVE-2014-3507 - avoid memory leak in DTLS
  • fix CVE-2014-3508 - fix OID handling to avoid information leak
  • fix CVE-2014-3509 - fix race condition when parsing server hello
  • fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS
  • fix CVE-2014-3511 - disallow protocol downgrade via fragmentation

[1.0.1e-28]

  • fix CVE-2014-0224 fix that broke EAP-FAST session resumption support

[1.0.1e-26]

  • drop EXPORT, RC2, and DES from the default cipher list (#1057520)
  • print ephemeral key size negotiated in TLS handshake (#1057715)
  • do not include ECC ciphersuites in SSLv2 client hello (#1090952)
  • properly detect encryption failure in BIO (#1100819)
  • fail on hmac integrity check if the .hmac file is empty (#1105567)
  • FIPS mode: make the limitations on DSA, DH, and RSA keygen length enforced only if OPENSSL_ENFORCE_MODULUS_BITS environment variable is set

[1.0.1e-25]

  • fix CVE-2010-5298 - possible use of memory after free
  • fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment
  • fix CVE-2014-0198 - possible NULL pointer dereference
  • fix CVE-2014-0221 - DoS from invalid DTLS handshake packet
  • fix CVE-2014-0224 - SSL/TLS MITM vulnerability
  • fix CVE-2014-3470 - client-side DoS when using anonymous ECDH

[1.0.1e-24]

  • add back support for secp521r1 EC curve

[1.0.1e-23]

  • fix CVE-2014-0160 - information disclosure in TLS heartbeat extension

[1.0.1e-22]

  • use 2048 bit RSA key in FIPS selftests

[1.0.1e-21]

  • add DH_compute_key_padded needed for FIPS CAVS testing
  • make 3des strength to be 128 bits instead of 168 (#1056616)
  • FIPS mode: do not generate DSA keys and DH parameters < 2048 bits
  • FIPS mode: use approved RSA keygen (allows only 2048 and 3072 bit keys)
  • FIPS mode: add DH selftest
  • FIPS mode: reseed DRBG properly on RAND_add()
  • FIPS mode: add RSA encrypt/decrypt selftest
  • FIPS mode: add hard limit for 2^32 GCM block encryptions with the same key
  • use the key length from configuration file if req -newkey rsa is invoked

[1.0.1e-20]

  • fix CVE-2013-4353 - Invalid TLS handshake crash

[1.0.1e-19]

  • fix CVE-2013-6450 - possible MiTM attack on DTLS1

[1.0.1e-18]

  • fix CVE-2013-6449 - crash when version in SSL structure is incorrect

[1.0.1e-17]

  • add back some no-op symbols that were inadvertently dropped

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

openssl

1.0.1e-30.el6_6.2

openssl-devel

1.0.1e-30.el6_6.2

openssl-perl

1.0.1e-30.el6_6.2

openssl-static

1.0.1e-30.el6_6.2

Oracle Linux i686

openssl

1.0.1e-30.el6_6.2

openssl-devel

1.0.1e-30.el6_6.2

openssl-perl

1.0.1e-30.el6_6.2

openssl-static

1.0.1e-30.el6_6.2

Oracle Linux 7

Oracle Linux x86_64

openssl

1.0.1e-34.el7_0.6

openssl-devel

1.0.1e-34.el7_0.6

openssl-libs

1.0.1e-34.el7_0.6

openssl-perl

1.0.1e-34.el7_0.6

openssl-static

1.0.1e-34.el7_0.6

Связанные CVE

Связанные уязвимости

fstec
больше 10 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

ubuntu
почти 11 лет назад

Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.

redhat
почти 11 лет назад

Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.

nvd
почти 11 лет назад

Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.

debian
почти 11 лет назад

Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 b ...