[Oraclevm-errata] New openssl updates available via Ksplice (OVMSA-2019-0040)

Errata Announcements for Oracle VM oraclevm-errata at oss.oracle.com
Tue Aug 20 01:33:52 PDT 2019


Synopsis: OVMSA-2019-0040 can now be patched using Ksplice
CVEs: CVE-2019-1559

Users with Oracle VM Premier Support can now use Ksplice to patch
against the latest Oracle VM Security Fix Advisory, OVMSA-2019-0040.

INSTALLING THE UPDATES

We recommend that all users of Ksplice on OVM 3.4 install these
updates.

You can install these updates by running:

# ksplice -y user upgrade

32-bit applications should be restarted after upgrading the on-disk
openssl RPMs and statically linked applications using
openssl should be rebuilt to include these fixes.

Ksplice user-space patching requires installation of Ksplice-aware
packages and the system must be rebooted after the first installation of
these packages.  Refer to the installation instructions for the Enhanced
Ksplice Client in the Ksplice User's Guide for more details.  Systems
may be prepared for Ksplice patching by installing the Ksplice aware
packages in advance, prior to installing the enhanced Ksplice client.

DESCRIPTION

* CVE-2019-1559: 0-byte record padding oracle.

A 0-byte record padding oracle could allow a remote attacker to decrypt
sensitive data when shutting down an SSL connection.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.




More information about the Oraclevm-errata mailing list