First published: Thu Nov 17 2016(Updated: )
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.<br>Security Fix(es):<br><li> A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)</li> Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1e-42.el6_7.6 | 1.0.1e-42.el6_7.6 |
redhat/openssl | <1.0.1e-42.el6_7.6 | 1.0.1e-42.el6_7.6 |
redhat/openssl-debuginfo | <1.0.1e-42.el6_7.6 | 1.0.1e-42.el6_7.6 |
redhat/openssl-debuginfo | <1.0.1e-42.el6_7.6 | 1.0.1e-42.el6_7.6 |
redhat/openssl-devel | <1.0.1e-42.el6_7.6 | 1.0.1e-42.el6_7.6 |
redhat/openssl-devel | <1.0.1e-42.el6_7.6 | 1.0.1e-42.el6_7.6 |
redhat/openssl-perl | <1.0.1e-42.el6_7.6 | 1.0.1e-42.el6_7.6 |
redhat/openssl-static | <1.0.1e-42.el6_7.6 | 1.0.1e-42.el6_7.6 |
redhat/openssl-perl | <1.0.1e-42.el6_7.6 | 1.0.1e-42.el6_7.6 |
redhat/openssl-static | <1.0.1e-42.el6_7.6 | 1.0.1e-42.el6_7.6 |
redhat/openssl | <1.0.1e-30.el6_6.13 | 1.0.1e-30.el6_6.13 |
redhat/openssl | <1.0.1e-30.el6_6.13 | 1.0.1e-30.el6_6.13 |
redhat/openssl-debuginfo | <1.0.1e-30.el6_6.13 | 1.0.1e-30.el6_6.13 |
redhat/openssl-debuginfo | <1.0.1e-30.el6_6.13 | 1.0.1e-30.el6_6.13 |
redhat/openssl-devel | <1.0.1e-30.el6_6.13 | 1.0.1e-30.el6_6.13 |
redhat/openssl-devel | <1.0.1e-30.el6_6.13 | 1.0.1e-30.el6_6.13 |
redhat/openssl-perl | <1.0.1e-30.el6_6.13 | 1.0.1e-30.el6_6.13 |
redhat/openssl-static | <1.0.1e-30.el6_6.13 | 1.0.1e-30.el6_6.13 |
redhat/openssl | <1.0.1e-16.el6_5.17 | 1.0.1e-16.el6_5.17 |
redhat/openssl | <1.0.1e-16.el6_5.17 | 1.0.1e-16.el6_5.17 |
redhat/openssl-debuginfo | <1.0.1e-16.el6_5.17 | 1.0.1e-16.el6_5.17 |
redhat/openssl-debuginfo | <1.0.1e-16.el6_5.17 | 1.0.1e-16.el6_5.17 |
redhat/openssl-devel | <1.0.1e-16.el6_5.17 | 1.0.1e-16.el6_5.17 |
redhat/openssl-devel | <1.0.1e-16.el6_5.17 | 1.0.1e-16.el6_5.17 |
redhat/openssl-perl | <1.0.1e-16.el6_5.17 | 1.0.1e-16.el6_5.17 |
redhat/openssl-static | <1.0.1e-16.el6_5.17 | 1.0.1e-16.el6_5.17 |
redhat/openssl | <1.0.0-27.el6_4.6 | 1.0.0-27.el6_4.6 |
redhat/openssl | <1.0.0-27.el6_4.6 | 1.0.0-27.el6_4.6 |
redhat/openssl-debuginfo | <1.0.0-27.el6_4.6 | 1.0.0-27.el6_4.6 |
redhat/openssl-debuginfo | <1.0.0-27.el6_4.6 | 1.0.0-27.el6_4.6 |
redhat/openssl-devel | <1.0.0-27.el6_4.6 | 1.0.0-27.el6_4.6 |
redhat/openssl-devel | <1.0.0-27.el6_4.6 | 1.0.0-27.el6_4.6 |
redhat/openssl-perl | <1.0.0-27.el6_4.6 | 1.0.0-27.el6_4.6 |
redhat/openssl-static | <1.0.0-27.el6_4.6 | 1.0.0-27.el6_4.6 |
redhat/openssl | <1.0.0-20.el6_2.9 | 1.0.0-20.el6_2.9 |
redhat/openssl | <1.0.0-20.el6_2.9 | 1.0.0-20.el6_2.9 |
redhat/openssl-debuginfo | <1.0.0-20.el6_2.9 | 1.0.0-20.el6_2.9 |
redhat/openssl-debuginfo | <1.0.0-20.el6_2.9 | 1.0.0-20.el6_2.9 |
redhat/openssl-devel | <1.0.0-20.el6_2.9 | 1.0.0-20.el6_2.9 |
redhat/openssl-devel | <1.0.0-20.el6_2.9 | 1.0.0-20.el6_2.9 |
redhat/openssl-perl | <1.0.0-20.el6_2.9 | 1.0.0-20.el6_2.9 |
redhat/openssl-static | <1.0.0-20.el6_2.9 | 1.0.0-20.el6_2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.