FEDORA-2016-97454404fe

security update in Fedora 23 for openssl

Status: stable 2 years ago

Update from upstream with multiple security issues fixed.

Comments 7

This update has been submitted for testing by tmraz.

tmraz edited this update.

New build(s):

  • openssl-1.0.2j-1.fc23

Removed build(s):

  • openssl-1.0.2i-2.fc23

tmraz edited this update.

This update has been pushed to testing.

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

This update has been submitted for stable by tmraz.

This update has been pushed to stable.

Add Comment & Feedback

Please login to add feedback.

Content Type
RPM
Status
stable
Test Gating
Submitted by
Update Type
security
Update Severity
medium
Karma
0
stable threshold: 2
unstable threshold: -2
Autopush (karma)
Enabled
Autopush (time)
Disabled
Dates
submitted 2 years ago
in testing 2 years ago
in stable 2 years ago
modified 2 years ago

Related Bugs 18

00 #1341705 CVE-2016-2177 openssl: Possible integer overflow vulnerabilities in codebase
00 #1341706 CVE-2016-2177 openssl: Possible integer overflow vulnerabilities in codebase [fedora-all]
00 #1343400 CVE-2016-2178 openssl: Non-constant time codepath followed for certain operations in DSA implementation
00 #1343401 CVE-2016-2178 openssl: Non-constant time codepath followed for certain operations in DSA implementation [fedora-all]
00 #1359615 CVE-2016-2180 OpenSSL: OOB read in TS_OBJ_print_bio()
00 #1359616 CVE-2016-2180 OpenSSL: OOB read in TS_OBJ_print_bio() [fedora-all]
00 #1367340 CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()
00 #1367343 CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec() [fedora-all]
00 #1369113 CVE-2016-2181 openssl: DTLS replay protection bypass allows DoS against DTLS connection
00 #1369114 CVE-2016-2181 openssl: DTLS replay protection bypass via sending large sequence number [fedora-all]
00 #1369504 CVE-2016-2179 openssl: DTLS memory exhaustion DoS when messages are not removed from fragment buffer
00 #1369505 CVE-2016-2179 openssl: DoS attack by filling up the queue for future messages [fedora-all]
00 #1369855 CVE-2016-6302 openssl: Insufficient TLS session ticket HMAC length checks
00 #1369858 CVE-2016-6302 openssl: Insufficient ticket sanity checks [fedora-all]
00 #1377594 CVE-2016-6306 openssl: certificate message OOB reads
00 #1377600 CVE-2016-6304 openssl: OCSP Status Request extension unbounded memory growth
00 #1378408 CVE-2016-6304 CVE-2016-6306 openssl: various flaws [fedora-all]
00 #1379310 CVE-2016-7052 openssl: Missing CRL sanity check

Automated Test Results