[linux-sparc-announce] LFSSA-2016-0367 Important: Linux for SPARC 1.0 openssl security update

Announcements for Linux for SPARC linux-sparc-announce at oss.oracle.com
Thu Sep 29 09:20:01 PDT 2016


Linux for SPARC Security Advisory LFSSA-2016-0367

The following updated rpms for Linux for SPARC 1.0 have been uploaded to 
the yum.oracle.com:

sparc64:
openssl-1.0.1e-48.0.2.el6_8.3.sparc64.rpm
openssl-devel-1.0.1e-48.0.2.el6_8.3.sparc64.rpm
openssl-perl-1.0.1e-48.0.2.el6_8.3.sparc64.rpm
openssl-static-1.0.1e-48.0.2.el6_8.3.sparc64.rpm


SRPMS:
http://yum.oracle.com/repo/linux_sparc64/latest/openssl-1.0.1e-48.0.2.el6_8.3.src.rpm



Description of changes:

[1.0.1e-48.0.2.3]
- re-incorporate the sparc64 patches 
(philip.copeland at oracle.com/john.haxby at oracle.com)
- disable the no-asm flag for sparc64 
(philip.copeland at oracle.com/john.haxby at oracle.com)

[1.0.1e-48.3]
- fix CVE-2016-2177 - possible integer overflow
- fix CVE-2016-2178 - non-constant time DSA operations
- fix CVE-2016-2179 - further DoS issues in DTLS
- fix CVE-2016-2180 - OOB read in TS_OBJ_print_bio()
- fix CVE-2016-2181 - DTLS1 replay protection and unprocessed records issue
- fix CVE-2016-2182 - possible buffer overflow in BN_bn2dec()
- fix CVE-2016-6302 - insufficient TLS session ticket HMAC length check
- fix CVE-2016-6304 - unbound memory growth with OCSP status request
- fix CVE-2016-6306 - certificate message OOB reads
- mitigate CVE-2016-2183 - degrade all 64bit block ciphers and RC4 to
   112 bit effective strength
- replace expired testing certificates





More information about the linux-sparc-announce mailing list