Synopsis:          Important: openssl security update
Advisory ID:       SLSA-2014:0015-1
Issue Date:        2014-01-08
CVE Numbers:       CVE-2013-6449
                   CVE-2013-6450
                   CVE-2013-4353
--

A flaw was found in the way OpenSSL determined which hashing algorithm to
use when TLS protocol version 1.2 was enabled. This could possibly cause
OpenSSL to use an incorrect hashing algorithm, leading to a crash of an
application using the library. (CVE-2013-6449)

It was discovered that the Datagram Transport Layer Security (DTLS)
protocol implementation in OpenSSL did not properly maintain encryption
and digest contexts during renegotiation. A lost or discarded
renegotiation handshake packet could cause a DTLS client or server using
OpenSSL to crash. (CVE-2013-6450)

A NULL pointer dereference flaw was found in the way OpenSSL handled
TLS/SSL protocol handshake packets. A specially crafted handshake packet
could cause a TLS/SSL client using OpenSSL to crash. (CVE-2013-4353)

For the update to take effect, all services linked to the OpenSSL library
must be restarted, or the system rebooted.
--

SL6
  x86_64
    openssl-1.0.1e-16.el6_5.4.i686.rpm
    openssl-1.0.1e-16.el6_5.4.x86_64.rpm
    openssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm
    openssl-debuginfo-1.0.1e-16.el6_5.4.x86_64.rpm
    openssl-devel-1.0.1e-16.el6_5.4.i686.rpm
    openssl-devel-1.0.1e-16.el6_5.4.x86_64.rpm
    openssl-perl-1.0.1e-16.el6_5.4.x86_64.rpm
    openssl-static-1.0.1e-16.el6_5.4.x86_64.rpm
  i386
    openssl-1.0.1e-16.el6_5.4.i686.rpm
    openssl-debuginfo-1.0.1e-16.el6_5.4.i686.rpm
    openssl-devel-1.0.1e-16.el6_5.4.i686.rpm
    openssl-perl-1.0.1e-16.el6_5.4.i686.rpm
    openssl-static-1.0.1e-16.el6_5.4.i686.rpm

- Scientific Linux Development Team