LWN.net Logo

Fedora alert FEDORA-2013-2834 (openssl)

From:  updates@fedoraproject.org
To:  package-announce@lists.fedoraproject.org
Subject:  [SECURITY] Fedora 18 Update: openssl-1.0.1e-3.fc18
Date:  Sat, 02 Mar 2013 19:55:52 +0000
Message-ID:  <20130302195550.C041720764@bastion01.phx2.fedoraproject.org>
Archive-link:  Article, Thread

-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2013-2834 2013-02-21 04:54:26 -------------------------------------------------------------------------------- Name : openssl Product : Fedora 18 Version : 1.0.1e Release : 3.fc18 URL : http://www.openssl.org/ Summary : Utilities from the general purpose cryptography library with TLS implementation Description : The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols. -------------------------------------------------------------------------------- Update Information: Multiple security and bug fixes update from upstream. -------------------------------------------------------------------------------- ChangeLog: * Tue Feb 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-3 - fix up the SHLIB_VERSION_NUMBER * Tue Feb 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-2 - disable ZLIB loading by default (due to CRIME attack) * Tue Feb 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-1 - new upstream version * Wed Jan 30 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1c-12 - more fixes from upstream - fix errors in manual causing build failure (#904777) * Fri Dec 21 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-11 - add script for renewal of a self-signed cert by Philip Prindeville (#871566) - allow X509_issuer_and_serial_hash() produce correct result in the FIPS mode (#881336) * Thu Dec 6 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-10 - do not load default verify paths if CApath or CAfile specified (#884305) * Tue Nov 20 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-9 - more fixes from upstream CVS - fix DSA key pairwise check (#878597) * Thu Nov 15 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-8 - use 1024 bit DH parameters in s_server as 512 bit is not allowed in FIPS mode and it is quite weak anyway * Mon Sep 10 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-7 - add missing initialization of str in aes_ccm_init_key (#853963) - add important patches from upstream CVS - use the secure_getenv() with new glibc -------------------------------------------------------------------------------- References: [ 1 ] Bug #839735 - openssl: environment settings honored when used in privileged apps https://bugzilla.redhat.com/show_bug.cgi?id=839735 [ 2 ] Bug #907589 - CVE-2013-0169 SSL/TLS: CBC padding timing attack (lucky-13) https://bugzilla.redhat.com/show_bug.cgi?id=907589 [ 3 ] Bug #908052 - CVE-2013-0166 openssl: DoS due to improper handling of OCSP response verification https://bugzilla.redhat.com/show_bug.cgi?id=908052 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update openssl' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds