OCSP Status Request extension unbounded memory growth (CVE-2016-6304) - denial of service : Servers using OpenSSL versions prior to 1.0.1g are not vulnerable in a default configuration, instead only if an application explicitly enables OCSP stapling support. Redhat and Centos do not use that version of openssl, so as long as your applications arent forcing OCSP stapling support, you're safe.
SSL_peek() hang on empty record (CVE-2016-6305) - denial of service : This only effects systems running openssl 1.1.0. Redhat and Centos do not use that version of openssl.
SWEET32 Mitigation (CVE-2016-2183): This does not effect systems running ASL, as ASL already disabled these weak ciphers.
Security annoucements of interest to the AtomiCorp community, such as vulnerabilities in third party applications.