FEDORA-2016-64e0743e16

security update in Fedora 25 for openssl

Status: stable 3 years ago

Update from upstream with multiple security issues fixed.

How to install

sudo dnf upgrade --advisory=FEDORA-2016-64e0743e16

Comments 7

This update has been submitted for testing by tmraz.

tmraz edited this update.

New build(s):

  • openssl-1.0.2j-1.fc25

Removed build(s):

  • openssl-1.0.2i-2.fc25

This update has been pushed to testing.

Works fine! LGTM! =)

karma: +1

This update has been submitted for stable by bodhi.

Works for me.

karma: +1

This update has been pushed to stable.

Add Comment & Feedback

Please login to add feedback.

Content Type
RPM
Status
stable
Test Gating
Submitted by
Update Type
security
Update Severity
medium
Karma
+2
stable threshold: 2
unstable threshold: -2
Autopush (karma)
Enabled
Autopush (time)
Disabled
Dates
submitted 3 years ago
in testing 3 years ago
in stable 3 years ago
modified 3 years ago

Related Bugs 18

00 #1341705 CVE-2016-2177 openssl: Possible integer overflow vulnerabilities in codebase
00 #1341706 CVE-2016-2177 openssl: Possible integer overflow vulnerabilities in codebase [fedora-all]
00 #1343400 CVE-2016-2178 openssl: Non-constant time codepath followed for certain operations in DSA implementation
00 #1343401 CVE-2016-2178 openssl: Non-constant time codepath followed for certain operations in DSA implementation [fedora-all]
00 #1359615 CVE-2016-2180 OpenSSL: OOB read in TS_OBJ_print_bio()
00 #1359616 CVE-2016-2180 OpenSSL: OOB read in TS_OBJ_print_bio() [fedora-all]
00 #1367340 CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()
00 #1367343 CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec() [fedora-all]
00 #1369113 CVE-2016-2181 openssl: DTLS replay protection bypass allows DoS against DTLS connection
00 #1369114 CVE-2016-2181 openssl: DTLS replay protection bypass via sending large sequence number [fedora-all]
00 #1369504 CVE-2016-2179 openssl: DTLS memory exhaustion DoS when messages are not removed from fragment buffer
00 #1369505 CVE-2016-2179 openssl: DoS attack by filling up the queue for future messages [fedora-all]
00 #1369855 CVE-2016-6302 openssl: Insufficient TLS session ticket HMAC length checks
00 #1369858 CVE-2016-6302 openssl: Insufficient ticket sanity checks [fedora-all]
00 #1377594 CVE-2016-6306 openssl: certificate message OOB reads
00 #1377600 CVE-2016-6304 openssl: OCSP Status Request extension unbounded memory growth
00 #1378408 CVE-2016-6304 CVE-2016-6306 openssl: various flaws [fedora-all]
00 #1379310 CVE-2016-7052 openssl: Missing CRL sanity check

Automated Test Results