Oval Definition:oval:org.mitre.oval:def:27084
Revision Date:2015-02-23Version:15
Title:ELSA-2014-1652 -- openssl security update
Description:[1.0.1e-30.2]- fix CVE-2014-3567 - memory leak when handling session tickets- fix CVE-2014-3513 - memory leak in srtp support- add support for fallback SCSV to partially mitigate CVE-2014-3566 (padding attack on SSL3)[1.0.1e-30]- add ECC TLS extensions to DTLS (#1119800)[1.0.1e-29]- fix CVE-2014-3505 - doublefree in DTLS packet processing- fix CVE-2014-3506 - avoid memory exhaustion in DTLS- fix CVE-2014-3507 - avoid memory leak in DTLS- fix CVE-2014-3508 - fix OID handling to avoid information leak- fix CVE-2014-3509 - fix race condition when parsing server hello- fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS- fix CVE-2014-3511 - disallow protocol downgrade via fragmentation[1.0.1e-28]- fix CVE-2014-0224 fix that broke EAP-FAST session resumption support[1.0.1e-26]- drop EXPORT, RC2, and DES from the default cipher list (#1057520)- print ephemeral key size negotiated in TLS handshake (#1057715)- do not include ECC ciphersuites in SSLv2 client hello (#1090952)- properly detect encryption failure in BIO (#1100819)- fail on hmac integrity check if the .hmac file is empty (#1105567)- FIPS mode: make the limitations on DSA, DH, and RSA keygen length enforced only if OPENSSL_ENFORCE_MODULUS_BITS environment variable is set[1.0.1e-25]- fix CVE-2010-5298 - possible use of memory after free- fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment- fix CVE-2014-0198 - possible NULL pointer dereference- fix CVE-2014-0221 - DoS from invalid DTLS handshake packet- fix CVE-2014-0224 - SSL/TLS MITM vulnerability- fix CVE-2014-3470 - client-side DoS when using anonymous ECDH[1.0.1e-24]- add back support for secp521r1 EC curve[1.0.1e-23]- fix CVE-2014-0160 - information disclosure in TLS heartbeat extension[1.0.1e-22]- use 2048 bit RSA key in FIPS selftests[1.0.1e-21]- add DH_compute_key_padded needed for FIPS CAVS testing- make 3des strength to be 128 bits instead of 168 (#1056616)- FIPS mode: do not generate DSA keys and DH parameters < 2048 bits- FIPS mode: use approved RSA keygen (allows only 2048 and 3072 bit keys)- FIPS mode: add DH selftest- FIPS mode: reseed DRBG properly on RAND_add()- FIPS mode: add RSA encrypt/decrypt selftest- FIPS mode: add hard limit for 2^32 GCM block encryptions with the same key- use the key length from configuration file if req -newkey rsa is invoked[1.0.1e-20]- fix CVE-2013-4353 - Invalid TLS handshake crash[1.0.1e-19]- fix CVE-2013-6450 - possible MiTM attack on DTLS1[1.0.1e-18]- fix CVE-2013-6449 - crash when version in SSL structure is incorrect[1.0.1e-17]- add back some no-op symbols that were inadvertently dropped
Family:unixClass:patch
Status:ACCEPTEDReference(s):CVE-2014-3513
CVE-2014-3567
ELSA-2014-1652
Platform(s):Oracle Linux 6
Oracle Linux 7
Product(s):openssl
openssl-devel
openssl-libs
openssl-perl
openssl-static
Definition Synopsis
  • Oracle Linux 6 release section
  • Oracle Linux 6.x
  • AND Packages match section
  • openssl is earlier than 0:1.0.1e-30.el6_6.2
  • OR openssl-devel is earlier than 0:1.0.1e-30.el6_6.2
  • OR openssl-perl is earlier than 0:1.0.1e-30.el6_6.2
  • OR openssl-static is earlier than 0:1.0.1e-30.el6_6.2
  • Oracle Linux 7 release section
  • Oracle Linux 7.x
  • AND Packages match section
  • openssl is earlier than 1:1.0.1e-34.el7_0.6
  • OR openssl-devel is earlier than 1:1.0.1e-34.el7_0.6
  • OR openssl-libs is earlier than 1:1.0.1e-34.el7_0.6
  • OR openssl-perl is earlier than 1:1.0.1e-34.el7_0.6
  • OR openssl-static is earlier than 1:1.0.1e-34.el7_0.6
  • BACK