Fedora alert FEDORA-2011-1273 (openssl)
From: | updates@fedoraproject.org | |
To: | package-announce@lists.fedoraproject.org | |
Subject: | [SECURITY] Fedora 14 Update: openssl-1.0.0d-1.fc14 | |
Date: | Mon, 14 Feb 2011 20:28:21 +0000 | |
Message-ID: | <20110214202821.6B3FC110D28@bastion02.phx2.fedoraproject.org> | |
Archive‑link: | Article |
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2011-1273 2011-02-10 20:46:56 -------------------------------------------------------------------------------- Name : openssl Product : Fedora 14 Version : 1.0.0d Release : 1.fc14 URL : http://www.openssl.org/ Summary : A general purpose cryptography library with TLS implementation Description : The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols. -------------------------------------------------------------------------------- Update Information: This is update to a new upstream release that fixes CVE-2011-0014 - OCSP stapling vulnerability. There are also changes updating the FIPS validation related code that should not affect in any way operation of the OpenSSL library in the non-FIPS mode. -------------------------------------------------------------------------------- ChangeLog: * Thu Feb 10 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-1 - new upstream release fixing CVE-2011-0014 (OCSP stapling vulnerability) * Tue Feb 8 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.0.0c-4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild * Fri Feb 4 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0c-3 - add -x931 parameter to openssl genrsa command to use the ANSI X9.31 key generation method - use FIPS-186-3 method for DSA parameter generation - add OPENSSL_FIPS_NON_APPROVED_MD5_ALLOW environment variable to allow using MD5 when the system is in the maintenance state even if the /proc fips flag is on - make openssl pkcs12 command work by default in the FIPS mode * Mon Jan 24 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0c-2 - listen on ipv6 wildcard in s_server so we accept connections from both ipv4 and ipv6 (#601612) - fix openssl speed command so it can be used in the FIPS mode with FIPS allowed ciphers * Fri Dec 3 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0c-1 - new upstream version fixing CVE-2010-4180 * Tue Nov 23 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0b-3 - replace the revert for the s390x bignum asm routines with fix from upstream * Mon Nov 22 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0b-2 - revert upstream change in s390x bignum asm routines * Tue Nov 16 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0b-1 - new upstream version fixing CVE-2010-3864 (#649304) * Tue Sep 7 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0a-3 - make SHLIB_VERSION reflect the library suffix -------------------------------------------------------------------------------- References: [ 1 ] Bug #676063 - CVE-2011-0014 openssl: OCSP stapling vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=676063 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update openssl' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-...