User: Password:
|
|
Subscribe / Log in / New account

Fedora alert FEDORA-2012-8024 (openssl)

From:  updates@fedoraproject.org
To:  package-announce@lists.fedoraproject.org
Subject:  [SECURITY] Fedora 15 Update: openssl-1.0.0j-1.fc15
Date:  Sun, 03 Jun 2012 00:02:27 +0000
Message-ID:  <20120603000227.D9C0A2139E@bastion01.phx2.fedoraproject.org>
Archive-link:  Article, Thread

-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2012-8024 2012-05-18 10:02:08 -------------------------------------------------------------------------------- Name : openssl Product : Fedora 15 Version : 1.0.0j Release : 1.fc15 URL : http://www.openssl.org/ Summary : A general purpose cryptography library with TLS implementation Description : The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols. -------------------------------------------------------------------------------- Update Information: This is new minor upstream update fixing moderate security issue CVE-2012-2333. -------------------------------------------------------------------------------- ChangeLog: * Tue May 15 2012 Tomas Mraz <tmraz@redhat.com> 1.0.0j-1 - new upstream release fixing CVE-2012-2333 - improper record length checking in DTLS * Fri Apr 20 2012 Tomas Mraz <tmraz@redhat.com> 1.0.0i-1 - new upstream release fixing CVE-2012-2110 - memory corruption when loading asn1 from BIO * Fri Mar 23 2012 Tomas Mraz <tmraz@redhat.com> 1.0.0h-1 - new upstream release fixing CVE-2012-0884 - Bleichenbacher attack against PKCS#7 and CMS (#802725) and CVE-2012-1165 mime_param_cmp NULL dereference (#802489) * Thu Jan 19 2012 Tomas Mraz <tmraz@redhat.com> 1.0.0g-1 - new upstream release fixing CVE-2012-0050 - DoS regression in DTLS support introduced by the previous release (#782795) * Thu Jan 5 2012 Tomas Mraz <tmraz@redhat.com> 1.0.0f-1 - new upstream release fixing multiple CVEs * Tue Nov 22 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-4 - move the libraries needed for static linking to Libs.private * Thu Nov 3 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-3 - do not use AVX instructions when osxsave bit not set - add direct known answer tests for SHA2 algorithms * Wed Sep 21 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-2 - fix missing initialization of variable in CHIL engine * Wed Sep 7 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-1 - new upstream release fixing CVE-2011-3207 (#736088) * Wed Aug 24 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-8 - drop the separate engine for Intel acceleration improvements and merge in the AES-NI, SHA1, and RC4 optimizations - add support for OPENSSL_DISABLE_AES_NI environment variable that disables the AES-NI support * Tue Jul 26 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-7 - correct openssl cms help output (#636266) - more tolerant starttls detection in XMPP protocol (#608239) * Wed Jul 20 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-6 - add support for newest Intel acceleration improvements backported from upstream by Intel in form of a separate engine * Thu Jun 9 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-5 - allow the AES-NI engine in the FIPS mode * Tue May 24 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-4 - add API necessary for CAVS testing of the new DSA parameter generation * Thu Apr 28 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-3 - add support for VIA Padlock on 64bit arch from upstream (#617539) - do not return bogus values from load_certs (#652286) * Tue Apr 5 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-2 - clarify apps help texts for available digest algorithms (#693858) -------------------------------------------------------------------------------- References: [ 1 ] Bug #820686 - CVE-2012-2333 openssl: record length handling integer underflow https://bugzilla.redhat.com/show_bug.cgi?id=820686 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update openssl' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-...


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds