U radu programskog paketa OpenSSL, za operacijski sustav Fedora 16, otkriveno je nekoliko sigurnosni propusta. Udaljeni ih napadač može iskoristiti za izvođenje napada uskraćivanjem usluge (DoS) i otkrivanje osjetljivih informacija.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-0232
2012-01-07 22:27:18
--------------------------------------------------------------------------------
Name : openssl
Product : Fedora 16
Version : 1.0.0f
Release : 1.fc16
URL : http://www.openssl.org/
Summary : A general purpose cryptography library with TLS implementation
Description :
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and
protocols.
--------------------------------------------------------------------------------
Update Information:
New upstream package with bugfixes and fixes for moderate and low impact CVEs.
--------------------------------------------------------------------------------
ChangeLog:
* Thu Jan 5 2012 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0f-1
- new upstream release fixing multiple CVEs
* Tue Nov 22 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-4
- move the libraries needed for static linking to Libs.private
* Thu Nov 3 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-3
- do not use AVX instructions when osxsave bit not set
- add direct known answer tests for SHA2 algorithms
* Wed Sep 21 2011 Tomas Mraz <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> 1.0.0e-2
- fix missing initialization of variable in CHIL engine
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #771770 - CVE-2011-4108 openssl: DTLS plaintext recovery attack
https://bugzilla.redhat.com/show_bug.cgi?id=771770
[ 2 ] Bug #771775 - CVE-2011-4576 openssl: uninitialized SSL 3.0 padding
https://bugzilla.redhat.com/show_bug.cgi?id=771775
[ 3 ] Bug #771778 - CVE-2011-4577 openssl: malformed RFC 3779 data can cause
assertion failures
https://bugzilla.redhat.com/show_bug.cgi?id=771778
[ 4 ] Bug #771780 - CVE-2011-4619 openssl: SGC restart DoS attack
https://bugzilla.redhat.com/show_bug.cgi?id=771780
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update openssl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke