CERT mailing list archives

OpenSSL Patches Multiple Vulnerabilities


From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Thu, 03 Dec 2015 15:13:46 -0600

U.S. Department of Homeland Security US-CERT

National Cyber Awareness System:

OpenSSL Patches Multiple Vulnerabilities [ 
https://www.us-cert.gov/ncas/current-activity/2015/12/03/OpenSSL-Patches-Multiple-Vulnerabilities ] 12/03/2015 03:04 PM 
EST 
Original release date: December 03, 2015

OpenSSL has released updates patching four vulnerabilities. Exploitation of one of these vulnerabilities could allow an 
attacker to cause a cause a Denial of Service condition. Updates available include:


  * OpenSSL 1.0.2e for 1.0.2 users 
  * OpenSSL 1.0.1q for 1.0.1 users 
  * OpenSSL 1.0.0t for 1.0.0 users 
  * OpenSSL 0.9.8zh for 0.9.8 users 

Users and administrators are encouraged to review the OpenSSL Security Advisory [ 
https://www.openssl.org/news/secadv/20151203.txt ] and apply the necessary updates.

________________________________________________________________________

This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy 
& Use [ http://www.us-cert.gov/privacy/ ] policy.

________________________________________________________________________

A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have 
questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a 
notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () 
ncas us-cert gov to your address book. 

OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ 
http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ 
http://www.us-cert.gov/related-resources ] 

STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] 


Current thread: