Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2017-0286

Опубликовано: 20 фев. 2017
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2017-0286: openssl security update (MODERATE)

[1.0.1e-48.4]

  • fix CVE-2017-3731 - DoS via truncated packets with RC4-MD5 cipher
  • fix CVE-2016-8610 - DoS of single-threaded servers via excessive alerts

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

openssl

1.0.1e-48.el6_8.4

openssl-devel

1.0.1e-48.el6_8.4

openssl-perl

1.0.1e-48.el6_8.4

openssl-static

1.0.1e-48.el6_8.4

Oracle Linux i686

openssl

1.0.1e-48.el6_8.4

openssl-devel

1.0.1e-48.el6_8.4

openssl-perl

1.0.1e-48.el6_8.4

openssl-static

1.0.1e-48.el6_8.4

Oracle Linux 7

Oracle Linux x86_64

openssl

1.0.1e-60.el7_3.1

openssl-devel

1.0.1e-60.el7_3.1

openssl-libs

1.0.1e-60.el7_3.1

openssl-perl

1.0.1e-60.el7_3.1

openssl-static

1.0.1e-60.el7_3.1

Связанные CVE

Связанные уязвимости

suse-cvrf
больше 8 лет назад

Security update for openssl

suse-cvrf
больше 8 лет назад

Security update for openssl1

suse-cvrf
больше 8 лет назад

Security update for openssl

suse-cvrf
больше 7 лет назад

Security update for openssl

CVSS3: 7.5
ubuntu
около 8 лет назад

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.