-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
openssl: CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6304, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307, CVE-2016-6308 #2171
Comments
@bryteise are there any good links for CVE-tracking WRT Clear Linux? 🙏 |
@tianon I'm sorry we do not have anything externally facing that can be linked to for the issue. It is something that is being looked at but I do not have any timeline for availability =(. This is something that is definitely being tracked and we are looking to make a release as soon as possible for these. |
@bryteise ok, that's good enough; thanks! 👍 |
Looks like we've a few fixes available upstream. 😄 @andyshinn
@prologic @frapposelli @vaygr 🙏 |
(Ubuntu is in progress, as is Debian) |
At least Debian and Ubuntu appear to be unaffected by this new advisory (https://security-tracker.debian.org/tracker/CVE-2016-7052, |
I think this is likely as good as it's going to get at this point. 👍 |
CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-2183, CVE-2016-6302, CVE-2016-6303, CVE-2016-6304, CVE-2016-6305, CVE-2016-6306, CVE-2016-6307, CVE-2016-6308
https://www.openssl.org/news/secadv/20160922.txt
alpine
: OpenSSL 1.0.2i for Alpine CVEs #2174busybox
: not affectedcentos
(RHEL derivative):clearlinux
: Update Clear Linux Project #2180crux
: ???debian
: Update Debian, especially for DSA-3673-1 #2179fedora
:mageia
:opensuse
:oraclelinux
: Updated Oracle Linux for OpenSSL CVEs #2203photon
:sourcemage
:ubuntu
: Update Ubuntu, especially for USN-3087-1 and USN-3087-2 #2182CVE-2016-2177: https://www.openssl.org/news/vulnerabilities.html#2016-2177
CVE-2016-2178: https://www.openssl.org/news/vulnerabilities.html#2016-2178
CVE-2016-2179: https://www.openssl.org/news/vulnerabilities.html#2016-2179
CVE-2016-2180: https://www.openssl.org/news/vulnerabilities.html#2016-2180
CVE-2016-2181: https://www.openssl.org/news/vulnerabilities.html#2016-2181
CVE-2016-2182: https://www.openssl.org/news/vulnerabilities.html#2016-2182
CVE-2016-2183: https://www.openssl.org/news/vulnerabilities.html#2016-2183 (does not appear to be listed on "vulnerabilities.html"); https://sweet32.info/
CVE-2016-6302: https://www.openssl.org/news/vulnerabilities.html#2016-6302
CVE-2016-6303: https://www.openssl.org/news/vulnerabilities.html#2016-6303
CVE-2016-6304: https://www.openssl.org/news/vulnerabilities.html#2016-6304
CVE-2016-6305: https://www.openssl.org/news/vulnerabilities.html#2016-6305
CVE-2016-6306: https://www.openssl.org/news/vulnerabilities.html#2016-6306
CVE-2016-6307: https://www.openssl.org/news/vulnerabilities.html#2016-6306
CVE-2016-6308: https://www.openssl.org/news/vulnerabilities.html#2016-6306
The text was updated successfully, but these errors were encountered: