Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: <updates <at> fedoraproject.org>
Subject: [SECURITY] Fedora 18 Update: openssl-1.0.1e-3.fc18
Newsgroups: gmane.linux.redhat.fedora.package.announce
Date: Saturday 2nd March 2013 19:55:52 UTC (over 3 years ago)
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2013-2834
2013-02-21 04:54:26
--------------------------------------------------------------------------------

Name        : openssl
Product     : Fedora 18
Version     : 1.0.1e
Release     : 3.fc18
URL         : http://www.openssl.org/
Summary     : Utilities from the general purpose cryptography library with
TLS implementation
Description :
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and
protocols.

--------------------------------------------------------------------------------
Update Information:

Multiple security and bug fixes update from upstream.

--------------------------------------------------------------------------------
ChangeLog:

* Tue Feb 19 2013 Tomas Mraz  1.0.1e-3
- fix up the SHLIB_VERSION_NUMBER
* Tue Feb 19 2013 Tomas Mraz  1.0.1e-2
- disable ZLIB loading by default (due to CRIME attack)
* Tue Feb 19 2013 Tomas Mraz  1.0.1e-1
- new upstream version
* Wed Jan 30 2013 Tomas Mraz  1.0.1c-12
- more fixes from upstream
- fix errors in manual causing build failure (#904777)
* Fri Dec 21 2012 Tomas Mraz  1.0.1c-11
- add script for renewal of a self-signed cert by Philip Prindeville
(#871566)
- allow X509_issuer_and_serial_hash() produce correct result in
  the FIPS mode (#881336)
* Thu Dec  6 2012 Tomas Mraz  1.0.1c-10
- do not load default verify paths if CApath or CAfile specified (#884305)
* Tue Nov 20 2012 Tomas Mraz  1.0.1c-9
- more fixes from upstream CVS
- fix DSA key pairwise check (#878597)
* Thu Nov 15 2012 Tomas Mraz  1.0.1c-8
- use 1024 bit DH parameters in s_server as 512 bit is not allowed
  in FIPS mode and it is quite weak anyway
* Mon Sep 10 2012 Tomas Mraz  1.0.1c-7
- add missing initialization of str in aes_ccm_init_key (#853963)
- add important patches from upstream CVS
- use the secure_getenv() with new glibc
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #839735 - openssl: environment settings honored when used in
privileged apps
        https://bugzilla.redhat.com/show_bug.cgi?id=839735
  [ 2 ] Bug #907589 - CVE-2013-0169 SSL/TLS: CBC padding timing attack
(lucky-13)
        https://bugzilla.redhat.com/show_bug.cgi?id=907589
  [ 3 ] Bug #908052 - CVE-2013-0166 openssl: DoS due to improper handling
of OCSP response verification
        https://bugzilla.redhat.com/show_bug.cgi?id=908052
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update openssl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on
the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
[email protected]
https://admin.fedoraproject.org/mailman/listinfo/package-announce
 
CD: 3ms