-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
openssl: CVE-2016-0800, CVE-2016-0705, CVE-2016-0798, CVE-2016-0797, CVE-2016-0702, CVE-2016-0703, CVE-2016-0799, CVE-2016-0704 #1490
Comments
@andyshinn looks like Alpine is ready 😄 @prologic Crux appears to be ready @maxamillion @flavio https://bugzilla.novell.com/show_bug.cgi?id=CVE-2016-0800 am I reading correctly that updates are available here? @Djelibeybi Oracle Linux has the fix available now, correct? (am I reading the status pages correctly there?) @vaygr looks like SourceMage has the update available too 👍 |
Yes, we pushed the RPMs out just over an hour ago. Our Docker images have been built and are currently in QA for sanity and regression testing. |
See issue docker-library#1490 Signed-off-by: Flavio Castelli <fcastelli@suse.com>
@jperrin am I reading correctly that CentOS should be fixed for all except CVE-2016-0799 now? |
@juanluisbaptiste looks like Mageia is fixed and ready for a rebuild now 😄 |
@frapposelli any idea what's up with Photon WRT this vuln? 😄 |
@tianon working on it... |
@tianon done, please check my PR. |
See issue docker-library#1490 Signed-off-by: Flavio Castelli <fcastelli@suse.com>
I think this is likely as good as it's going to get at this point. 👍 |
CVE-2016-0800 ("DROWN"), CVE-2016-0799, CVE-2016-0798, CVE-2016-0797, CVE-2016-0705, CVE-2016-0704, CVE-2016-0703, CVE-2016-0702 ("Cache Bleed")
https://mta.openssl.org/pipermail/openssl-announce/2016-March/000066.html
alpine
: Bump Alpine for the OpenSSL CVEs #1496busybox
: not applicablecentos
(RHEL derivative): update official images for openssl cve #1513https://access.redhat.com/security/cve/CVE-2016-0798https://access.redhat.com/security/cve/CVE-2016-0704https://access.redhat.com/security/cve/CVE-2016-0703crux
: ???debian
: Update debian (stable+oldstable) #1495https://security-tracker.debian.org/tracker/CVE-2016-0800https://security-tracker.debian.org/tracker/CVE-2016-0704https://security-tracker.debian.org/tracker/CVE-2016-0703fedora
: update rawhide, 23, and latest for openssl CVE-a-thon #1517https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-0798mageia
: Updated for openssl: CVE-2016-0800, CVE-2016-0705, CVE-2016-0798, CVE… #1514opensuse
: Update opensuse images to include ssl fixes #1501oraclelinux
: Updated Oracle Linux to address OpenSSL CVEs #1508photon
:sourcemage
:ubuntu
: Update ubuntu (especially for CVE-2016-0705, CVE-2016-0798, CVE-2016-0797, CVE-2016-0702, CVE-2016-0799) #1509http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0800.htmlhttp://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0704.htmlhttp://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0703.htmlThe text was updated successfully, but these errors were encountered: