[El-errata] New openssl updates available via Ksplice (ELSA-2017-0286)

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Thu Feb 23 01:11:54 PST 2017

Synopsis: ELSA-2017-0286 can now be patched using Ksplice
CVEs: CVE-2016-8610 CVE-2017-3731

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2017-0286.


We recommend that all users of Ksplice on OL 6 install these updates.

You can install these updates by running:

# ksplice -y user upgrade

32-bit applications should be restarted after upgrading the on-disk
openssl RPMs and statically linked applications using
openssl should be rebuilt to include these fixes.

Ksplice user-space patching requires installation of Ksplice-aware
packages and the system must be rebooted after the first installation of
these packages.  Refer to the installation instructions for the Enhanced
Ksplice Client in the Ksplice User's Guide for more details.  Systems
may be prepared for Ksplice patching by installing the Ksplice aware
packages in advance, prior to installing the enhanced Ksplice client.


* CVE-2016-8610: Remote denial-of-service vulnerability in ALERT packet handling.

Due to a missing limit check on the number of ALERT packets, a remote
attacker could flood a target server and prevent it from processing
messages from other clients.

* CVE-2017-3731: Out-of-bounds read on truncated packets.

Due to missing length checks, an attacker sending truncated packets
for certain ciphers could cause an out-of-bounds read. An attacker
could potentially use this to obtain sensitive information or cause
the program to crash.


Ksplice support is available at ksplice-support_ww at oracle.com.

More information about the El-errata mailing list