Updated openssl packages that fix three security issues are now availablefor Red Hat Enterprise Linux 5.Red Hat Product Security has rated this update as having Moderate securityimpact. Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section.

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)and Transport Layer Security (TLS v1) protocols, as well as afull-strength, general purpose cryptography library.An out-of-bounds read flaw was found in the X509_cmp_time() function ofOpenSSL. A specially crafted X.509 certificate or a Certificate RevocationList (CRL) could possibly cause a TLS/SSL server or client using OpenSSLto crash. (CVE-2015-1789)A NULL pointer dereference was found in the way OpenSSL handled certainPKCS#7 inputs. A specially crafted PKCS#7 input with missingEncryptedContent data could cause an application using OpenSSL to crash.(CVE-2015-1790)A flaw was found in the way the TLS protocol composes the Diffie-Hellman (DH) key exchange. A man-in-the-middle attacker could use this flaw to force the use of weak 512 bit export-grade keys during the key exchange, allowing them to decrypt all traffic. (CVE-2015-4000)Note: This update forces the TLS/SSL client implementation in OpenSSL to reject DH key sizes below 768 bits, which prevents sessions to be downgraded to export-grade keys. Future updates may raise this limit to 1024 bits.Red Hat would like to thank the OpenSSL project for reporting CVE-2015-1789and CVE-2015-1790. Upstream acknowledges Robert Swiecki and Hanno Böck asthe original reporters of CVE-2015-1789, and Michal Zalewski as theoriginal reporter of CVE-2015-1790.All openssl users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. For the update to takeeffect, all services linked to the OpenSSL library must be restarted, orthe system rebooted.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258RHEL Desktop Workstation (v. 5 client)

SRPMS:
openssl-0.9.8e-36.el5_11.src.rpm
    MD5: aef8cfd51868f4b16de06d6713b6fe73SHA-256: 1f4460cd77a43211b58ffc826ed953a5f043ff31e39aeeaec4b7abafb45b9dd3
 
IA-32:
openssl-debuginfo-0.9.8e-36.el5_11.i386.rpm
    MD5: e6108661dea7e27022df7a4b190001bcSHA-256: 2d83abc2b1332199071d595bbc8dd4822bedd802b09a5cf4482332b86818d1ed
openssl-devel-0.9.8e-36.el5_11.i386.rpm
    MD5: c39cd72629d68dfd6d014418047942c8SHA-256: 05230eab8b0cf2caa3103932ec429fe341725725dae23baf30d2be7e02ec6732
 
x86_64:
openssl-debuginfo-0.9.8e-36.el5_11.i386.rpm
    MD5: e6108661dea7e27022df7a4b190001bcSHA-256: 2d83abc2b1332199071d595bbc8dd4822bedd802b09a5cf4482332b86818d1ed
openssl-debuginfo-0.9.8e-36.el5_11.x86_64.rpm
    MD5: 219e9879dfa9256d006387478137fb4dSHA-256: 350bfb4696ad109d691830d339c7cbc307318308d714037076b6d445f08e0633
openssl-devel-0.9.8e-36.el5_11.i386.rpm
    MD5: c39cd72629d68dfd6d014418047942c8SHA-256: 05230eab8b0cf2caa3103932ec429fe341725725dae23baf30d2be7e02ec6732
openssl-devel-0.9.8e-36.el5_11.x86_64.rpm
    MD5: d7820842833290bfdfa14b4a7bfb9df8SHA-256: 51995f7c29b12a4d14c68939e5075235fce72f9ceb1c420a7927e5e91e9c07e5
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
openssl-0.9.8e-36.el5_11.src.rpm
    MD5: aef8cfd51868f4b16de06d6713b6fe73SHA-256: 1f4460cd77a43211b58ffc826ed953a5f043ff31e39aeeaec4b7abafb45b9dd3
 
IA-32:
openssl-0.9.8e-36.el5_11.i386.rpm
    MD5: 699211ac0d549ba8abfa2dce1f700d2eSHA-256: 5daebefcefa5545c1e85ab91dda35b1c76dbbf133ed3307c87106af86a8d718a
openssl-0.9.8e-36.el5_11.i686.rpm
    MD5: 4de1313756e66c804764cc4b2000d408SHA-256: d3668760eb3489c9658aaadce03c3bd3d671ed5ec654fed925312ec13c5e6d19
openssl-debuginfo-0.9.8e-36.el5_11.i386.rpm
    MD5: e6108661dea7e27022df7a4b190001bcSHA-256: 2d83abc2b1332199071d595bbc8dd4822bedd802b09a5cf4482332b86818d1ed
openssl-debuginfo-0.9.8e-36.el5_11.i686.rpm
    MD5: 1ceaf37489426852d2748a4c813a6c81SHA-256: 8f7aac020cbe434aea378f1b666f12c4861bb0ffdcdd66d7141fd841b8e7be81
openssl-devel-0.9.8e-36.el5_11.i386.rpm
    MD5: c39cd72629d68dfd6d014418047942c8SHA-256: 05230eab8b0cf2caa3103932ec429fe341725725dae23baf30d2be7e02ec6732
openssl-perl-0.9.8e-36.el5_11.i386.rpm
    MD5: d88a8ff23696625e1b74bf56e8ef6bb8SHA-256: ed79e2bc5c2f00cd9a3137d151e33e9564214bc6bfc13599d28bfdb80fc2c62e
 
IA-64:
openssl-0.9.8e-36.el5_11.i686.rpm
    MD5: 4de1313756e66c804764cc4b2000d408SHA-256: d3668760eb3489c9658aaadce03c3bd3d671ed5ec654fed925312ec13c5e6d19
openssl-0.9.8e-36.el5_11.ia64.rpm
    MD5: 8878071310d65e6f39893e2e6cf184e2SHA-256: 25898b216aa5808c05870271c3d9395da25a744c4ab2d9325a54394f0586e98e
openssl-debuginfo-0.9.8e-36.el5_11.i686.rpm
    MD5: 1ceaf37489426852d2748a4c813a6c81SHA-256: 8f7aac020cbe434aea378f1b666f12c4861bb0ffdcdd66d7141fd841b8e7be81
openssl-debuginfo-0.9.8e-36.el5_11.ia64.rpm
    MD5: 19eb8b7ed04b3433ef2588f45b593283SHA-256: 670652845380a73b1d1acc3eda4755afcfbf4b72610a5d0627f038d5114497d5
openssl-devel-0.9.8e-36.el5_11.ia64.rpm
    MD5: f3577c372662c34059b2652ccda68322SHA-256: 0b037baf5dd1e95684f0bc74e5f638a413ac0ac2c97e44ca5f8e9cd1d34df81f
openssl-perl-0.9.8e-36.el5_11.ia64.rpm
    MD5: ca5cd7f57bc383947ac30a79b03c0a7bSHA-256: 548035150e56441157ab3cda7d64801def18df386c1d36966bb91344518b42a1
 
PPC:
openssl-0.9.8e-36.el5_11.ppc.rpm
    MD5: 3d88ea4b59394269173d9002900a8958SHA-256: eb0ed8e0e0d77ae114f51c982bff5aaa5ecedbc886d6fbbef3de812aef1ef8d8
openssl-0.9.8e-36.el5_11.ppc64.rpm
    MD5: bc0b86f53309e19c10f68781d8d2946aSHA-256: 51b0acf9e57a495412acfb702a357873a810135100f817f4b3648abc3528396d
openssl-debuginfo-0.9.8e-36.el5_11.ppc.rpm
    MD5: a5d2b26543e421c57e089decbcfcd5dbSHA-256: 897d8c36df94f69ead5337d200417795ace6707a5897b835863cc50b48bebca6
openssl-debuginfo-0.9.8e-36.el5_11.ppc64.rpm
    MD5: 86d690d3408589da6b4dd0e1d55e8b8cSHA-256: ea536255eb322debe1d64ff97243c575c08dd18d5cd69811960602dc85d24bc4
openssl-devel-0.9.8e-36.el5_11.ppc.rpm
    MD5: 1ad7c90bc45b94fe6683e27b3dac8712SHA-256: 0a9d8ec519e43e97776b55ad51a23ec8a60918f68a079eaf3df21c604108d607
openssl-devel-0.9.8e-36.el5_11.ppc64.rpm
    MD5: bac39d45bb1a81f287e5490b8fda3cb0SHA-256: 68412c973e9bb78735bba07f691e7bcc8e6fb091590ceb69287c33835db91352
openssl-perl-0.9.8e-36.el5_11.ppc.rpm
    MD5: c2556e0ac7ec5bef91951a0bd438caffSHA-256: d46f034419e184a5c2d333315ba494cd8f7ef9c73ea25e22de065e113c05cce3
 
s390x:
openssl-0.9.8e-36.el5_11.s390.rpm
    MD5: 228cc6be10075f0aa524958def0dc820SHA-256: 3b4836359b4fbb38eddc3eb7c38f406139f8a460b4b4c0d94075081b13c23c6d
openssl-0.9.8e-36.el5_11.s390x.rpm
    MD5: 589d3ec4504cb3914d4fbdf39033d9f2SHA-256: 3aa86506ab3497c75824eab26d46f3c907065132b0cf7b76c4d7234ec737d32f
openssl-debuginfo-0.9.8e-36.el5_11.s390.rpm
    MD5: bc3e11ff46c2482c82984b895cb1e2efSHA-256: 0b738148f2ab911753f14fbdde9561ee003b4edec2c26c02c019ec2446580ff5
openssl-debuginfo-0.9.8e-36.el5_11.s390x.rpm
    MD5: 886da92dcc49f0513b5aba63e020a864SHA-256: f552bb150aee614a05127d8cad451d3138e3ba1d6caf8b65a985c30149e1979c
openssl-devel-0.9.8e-36.el5_11.s390.rpm
    MD5: 659a6ae07e61871bf0033d680d1f35ddSHA-256: 9650413eaba4aeccc5932562f87591b46a11b44f3fc441ec95f2901b08814729
openssl-devel-0.9.8e-36.el5_11.s390x.rpm
    MD5: e999d69c65132978f4cc57c92d463f50SHA-256: 005005d32353a13738602c1ae398552d6cfb9bf8c5bd4f6504775af3e8d39fd3
openssl-perl-0.9.8e-36.el5_11.s390x.rpm
    MD5: 12f0113c4dca76ddd262410cf53f45c5SHA-256: 3b8a275709c7307fdc72aaeffe0e7de3bfcb3819b254af25ea49cbf59b967fd2
 
x86_64:
openssl-0.9.8e-36.el5_11.i686.rpm
    MD5: 4de1313756e66c804764cc4b2000d408SHA-256: d3668760eb3489c9658aaadce03c3bd3d671ed5ec654fed925312ec13c5e6d19
openssl-0.9.8e-36.el5_11.x86_64.rpm
    MD5: f27bdde20d40698501014bf4b28020efSHA-256: 0107f4f8927e210a2035f4a30dae9acf29d14fd7b1c62ae40dcd70f4012f083e
openssl-debuginfo-0.9.8e-36.el5_11.i386.rpm
    MD5: e6108661dea7e27022df7a4b190001bcSHA-256: 2d83abc2b1332199071d595bbc8dd4822bedd802b09a5cf4482332b86818d1ed
openssl-debuginfo-0.9.8e-36.el5_11.i686.rpm
    MD5: 1ceaf37489426852d2748a4c813a6c81SHA-256: 8f7aac020cbe434aea378f1b666f12c4861bb0ffdcdd66d7141fd841b8e7be81
openssl-debuginfo-0.9.8e-36.el5_11.x86_64.rpm
    MD5: 219e9879dfa9256d006387478137fb4dSHA-256: 350bfb4696ad109d691830d339c7cbc307318308d714037076b6d445f08e0633
openssl-devel-0.9.8e-36.el5_11.i386.rpm
    MD5: c39cd72629d68dfd6d014418047942c8SHA-256: 05230eab8b0cf2caa3103932ec429fe341725725dae23baf30d2be7e02ec6732
openssl-devel-0.9.8e-36.el5_11.x86_64.rpm
    MD5: d7820842833290bfdfa14b4a7bfb9df8SHA-256: 51995f7c29b12a4d14c68939e5075235fce72f9ceb1c420a7927e5e91e9c07e5
openssl-perl-0.9.8e-36.el5_11.x86_64.rpm
    MD5: 747d3eb801af15e9adc2771328d06c0cSHA-256: 25454e3f907be3ce876b62d287d202c4b2e63ed5d0b925feb5186a838e9de5cc
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
openssl-0.9.8e-36.el5_11.src.rpm
    MD5: aef8cfd51868f4b16de06d6713b6fe73SHA-256: 1f4460cd77a43211b58ffc826ed953a5f043ff31e39aeeaec4b7abafb45b9dd3
 
IA-32:
openssl-0.9.8e-36.el5_11.i386.rpm
    MD5: 699211ac0d549ba8abfa2dce1f700d2eSHA-256: 5daebefcefa5545c1e85ab91dda35b1c76dbbf133ed3307c87106af86a8d718a
openssl-0.9.8e-36.el5_11.i686.rpm
    MD5: 4de1313756e66c804764cc4b2000d408SHA-256: d3668760eb3489c9658aaadce03c3bd3d671ed5ec654fed925312ec13c5e6d19
openssl-debuginfo-0.9.8e-36.el5_11.i386.rpm
    MD5: e6108661dea7e27022df7a4b190001bcSHA-256: 2d83abc2b1332199071d595bbc8dd4822bedd802b09a5cf4482332b86818d1ed
openssl-debuginfo-0.9.8e-36.el5_11.i686.rpm
    MD5: 1ceaf37489426852d2748a4c813a6c81SHA-256: 8f7aac020cbe434aea378f1b666f12c4861bb0ffdcdd66d7141fd841b8e7be81
openssl-perl-0.9.8e-36.el5_11.i386.rpm
    MD5: d88a8ff23696625e1b74bf56e8ef6bb8SHA-256: ed79e2bc5c2f00cd9a3137d151e33e9564214bc6bfc13599d28bfdb80fc2c62e
 
x86_64:
openssl-0.9.8e-36.el5_11.i686.rpm
    MD5: 4de1313756e66c804764cc4b2000d408SHA-256: d3668760eb3489c9658aaadce03c3bd3d671ed5ec654fed925312ec13c5e6d19
openssl-0.9.8e-36.el5_11.x86_64.rpm
    MD5: f27bdde20d40698501014bf4b28020efSHA-256: 0107f4f8927e210a2035f4a30dae9acf29d14fd7b1c62ae40dcd70f4012f083e
openssl-debuginfo-0.9.8e-36.el5_11.i686.rpm
    MD5: 1ceaf37489426852d2748a4c813a6c81SHA-256: 8f7aac020cbe434aea378f1b666f12c4861bb0ffdcdd66d7141fd841b8e7be81
openssl-debuginfo-0.9.8e-36.el5_11.x86_64.rpm
    MD5: 219e9879dfa9256d006387478137fb4dSHA-256: 350bfb4696ad109d691830d339c7cbc307318308d714037076b6d445f08e0633
openssl-perl-0.9.8e-36.el5_11.x86_64.rpm
    MD5: 747d3eb801af15e9adc2771328d06c0cSHA-256: 25454e3f907be3ce876b62d287d202c4b2e63ed5d0b925feb5186a838e9de5cc
 
(The unlinked packages above are only available from the Red Hat Network)
1223211 – CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks1228603 – CVE-2015-1789 OpenSSL: out-of-bounds read in X509_cmp_time1228604 – CVE-2015-1790 OpenSSL: PKCS7 crash with missing EnvelopedContent

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply