You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa openssl

Sigurnosni nedostaci programskog paketa openssl

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2014-0456
2014-01-09 06:45:22
——————————————————————————–

Name : openssl
Product : Fedora 19
Version : 1.0.1e
Release : 37.fc19
URL : http://www.openssl.org/
Summary : Utilities from the general purpose cryptography library with TLS implementation
Description :
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and
protocols.

——————————————————————————–
Update Information:

Security update fixing segfaults in DTLS and TLS implementation.

——————————————————————————–
ChangeLog:

* Tue Jan 7 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-37
– fix CVE-2013-4353 – Invalid TLS handshake crash
– fix CVE-2013-6450 – possible MiTM attack on DTLS1
* Fri Dec 20 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-36
– fix CVE-2013-6449 – crash when version in SSL structure is incorrect
– more FIPS validation requirement changes
– do not apply the no-md5-verify patch in released Fedora branches
* Wed Dec 18 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-35
– drop weak ciphers from the default TLS ciphersuite list
– add back some symbols that were dropped with update to 1.0.1 branch
– more FIPS validation requirement changes
* Tue Nov 19 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-34
– fix locking and reseeding problems with FIPS drbg
* Fri Nov 15 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-33
– additional changes required for FIPS validation
* Wed Nov 13 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-32
– disable verification of certificate, CRL, and OCSP signatures
using MD5 if OPENSSL_ENABLE_MD5_VERIFY environment variable
is not set
* Fri Nov 8 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-31
– add back support for secp521r1 EC curve
– add aarch64 to Configure (#969692)
* Tue Oct 29 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-30
– fix misdetection of RDRAND support on Cyrix CPUS (from upstream) (#1022346)
* Thu Oct 24 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-29
– do not advertise ECC curves we do not support (#1022493)
* Wed Oct 16 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-28
– only ECC NIST Suite B curves support
– drop -fips subpackage
* Mon Oct 14 2013 Tom Callaway <spot@fedoraproject.org> – 1.0.1e-27
– resolve bugzilla 319901 (phew! only took 6 years & 9 days)
* Fri Sep 27 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-26
– make DTLS1 work in FIPS mode
– avoid RSA and DSA 512 bits and Whirlpool in ‘openssl speed’ in FIPS mode
* Mon Sep 23 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-25
– avoid dlopening libssl.so from libcrypto (#1010357)
* Fri Sep 20 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-24
– fix small memory leak in FIPS aes selftest
* Thu Sep 19 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-23
– fix segfault in openssl speed hmac in the FIPS mode
* Thu Sep 12 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-22
– document the nextprotoneg option in manual pages
original patch by Hubert Kario
* Tue Sep 10 2013 Kyle McMartin <kyle@redhat.com> 1.0.1e-21
– [arm] use elf auxv to figure out armcap.c instead of playing silly
games with SIGILL handlers. (#1006474)
* Wed Sep 4 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-20
– try to avoid some races when updating the -fips subpackage
* Mon Sep 2 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-19
– use version-release in .hmac suffix to avoid overwrite
during upgrade
* Thu Aug 29 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-18
– allow deinitialization of the FIPS mode
* Thu Aug 29 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-17
– always perform the FIPS selftests in library constructor
if FIPS module is installed
* Tue Aug 27 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-16
– add -fips subpackage that contains the FIPS module files
* Fri Aug 16 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-15
– fix use of rdrand if available
– more commits cherry picked from upstream
– documentation fixes
* Sat Aug 3 2013 Petr Pisar <ppisar@redhat.com> – 1:1.0.1e-14
– Perl 5.18 rebuild
* Fri Jul 26 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-13
– additional manual page fix
– use symbol versioning also for the textual version
* Thu Jul 25 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-12
– additional manual page fixes
* Fri Jul 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-11
– use _prefix macro
* Wed Jul 17 2013 Petr Pisar <ppisar@redhat.com> – 1:1.0.1e-10
– Perl 5.18 rebuild
* Thu Jul 11 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-9
– add openssl.cnf.5 manpage symlink to config.5
* Wed Jul 10 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-8
– add relro linking flag
* Wed Jul 10 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-7
– add support for the -trusted_first option for certificate chain verification
* Fri May 3 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-6
– fix build of manual pages with current pod2man (#959439)
* Sun Apr 21 2013 Peter Robinson <pbrobinson@fedoraproject.org> 1.0.1e-5
– Enable ARM optimised build
——————————————————————————–
References:

[ 1 ] Bug #1047840 – CVE-2013-6450 openssl: crash in DTLS renegotiation after packet loss
https://bugzilla.redhat.com/show_bug.cgi?id=1047840
[ 2 ] Bug #1049058 – CVE-2013-4353 openssl: client NULL dereference crash on malformed handshake packets
https://bugzilla.redhat.com/show_bug.cgi?id=1049058
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update openssl’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2014-0476
2014-01-09 06:46:31
——————————————————————————–

Name : openssl
Product : Fedora 20
Version : 1.0.1e
Release : 37.fc20
URL : http://www.openssl.org/
Summary : Utilities from the general purpose cryptography library with TLS implementation
Description :
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and
protocols.

——————————————————————————–
Update Information:

Security update fixing segfaults in DTLS and TLS implementation.

——————————————————————————–
ChangeLog:

* Tue Jan 7 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-37
– fix CVE-2013-4353 – Invalid TLS handshake crash
– fix CVE-2013-6450 – possible MiTM attack on DTLS1
* Fri Dec 20 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-36
– fix CVE-2013-6449 – crash when version in SSL structure is incorrect
– more FIPS validation requirement changes
– do not apply the no-md5-verify patch in released Fedora branches
* Wed Dec 18 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-35
– drop weak ciphers from the default TLS ciphersuite list
– add back some symbols that were dropped with update to 1.0.1 branch
– more FIPS validation requirement changes
* Tue Nov 19 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-34
– fix locking and reseeding problems with FIPS drbg
* Fri Nov 15 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-33
– additional changes required for FIPS validation
* Wed Nov 13 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-32
– disable verification of certificate, CRL, and OCSP signatures
using MD5 if OPENSSL_ENABLE_MD5_VERIFY environment variable
is not set
* Fri Nov 8 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-31
– add back support for secp521r1 EC curve
– add aarch64 to Configure (#969692)
——————————————————————————–
References:

[ 1 ] Bug #1047840 – CVE-2013-6450 openssl: crash in DTLS renegotiation after packet loss
https://bugzilla.redhat.com/show_bug.cgi?id=1047840
[ 2 ] Bug #1049058 – CVE-2013-4353 openssl: client NULL dereference crash on malformed handshake packets
https://bugzilla.redhat.com/show_bug.cgi?id=1049058
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update openssl’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2014-0474
2014-01-09 06:46:26
——————————————————————————–

Name        : openssl
Product     : Fedora 18
Version     : 1.0.1e
Release     : 37.fc18
URL         : http://www.openssl.org/
Summary     : Utilities from the general purpose cryptography library with TLS implementation
Description :
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and
protocols.

——————————————————————————–
Update Information:

Security update fixing segfaults in DTLS and TLS implementation.

——————————————————————————–
ChangeLog:

* Tue Jan  7 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-37
– fix CVE-2013-4353 – Invalid TLS handshake crash
– fix CVE-2013-6450 – possible MiTM attack on DTLS1
* Fri Dec 20 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-36
– fix CVE-2013-6449 – crash when version in SSL structure is incorrect
– more FIPS validation requirement changes
– do not apply the no-md5-verify patch in released Fedora branches
* Wed Dec 18 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-35
– drop weak ciphers from the default TLS ciphersuite list
– add back some symbols that were dropped with update to 1.0.1 branch
– more FIPS validation requirement changes
* Tue Nov 19 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-34
– fix locking and reseeding problems with FIPS drbg
* Fri Nov 15 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-33
– additional changes required for FIPS validation
* Wed Nov 13 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-32
– disable verification of certificate, CRL, and OCSP signatures
  using MD5 if OPENSSL_ENABLE_MD5_VERIFY environment variable
  is not set
* Fri Nov  8 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-31
– add back support for secp521r1 EC curve
– add aarch64 to Configure (#969692)
* Tue Oct 29 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-30
– fix misdetection of RDRAND support on Cyrix CPUS (from upstream) (#1022346)
* Thu Oct 24 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-29
– do not advertise ECC curves we do not support (#1022493)
* Wed Oct 16 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-28
– only ECC NIST Suite B curves support
– drop -fips subpackage
* Mon Oct 14 2013 Tom Callaway <spot@fedoraproject.org> – 1.0.1e-27
– resolve bugzilla 319901 (phew! only took 6 years & 9 days)
* Fri Sep 27 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-26
– make DTLS1 work in FIPS mode
– avoid RSA and DSA 512 bits and Whirlpool in ‘openssl speed’ in FIPS mode
* Mon Sep 23 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-25
– avoid dlopening libssl.so from libcrypto (#1010357)
* Fri Sep 20 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-24
– fix small memory leak in FIPS aes selftest
* Thu Sep 19 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-23
– fix segfault in openssl speed hmac in the FIPS mode
* Thu Sep 12 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-22
– document the nextprotoneg option in manual pages
  original patch by Hubert Kario
* Tue Sep 10 2013 Kyle McMartin <kyle@redhat.com> 1.0.1e-21
– [arm] use elf auxv to figure out armcap.c instead of playing silly
  games with SIGILL handlers. (#1006474)
* Wed Sep  4 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-20
– try to avoid some races when updating the -fips subpackage
* Mon Sep  2 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-19
– use version-release in .hmac suffix to avoid overwrite
  during upgrade
* Thu Aug 29 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-18
– allow deinitialization of the FIPS mode
* Thu Aug 29 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-17
– always perform the FIPS selftests in library constructor
  if FIPS module is installed
* Tue Aug 27 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-16
– add -fips subpackage that contains the FIPS module files
* Fri Aug 16 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-15
– fix use of rdrand if available
– more commits cherry picked from upstream
– documentation fixes
* Sat Aug  3 2013 Petr Pisar <ppisar@redhat.com> – 1:1.0.1e-14
– Perl 5.18 rebuild
* Fri Jul 26 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-13
– additional manual page fix
– use symbol versioning also for the textual version
* Thu Jul 25 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-12
– additional manual page fixes
* Fri Jul 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-11
– use _prefix macro
* Wed Jul 17 2013 Petr Pisar <ppisar@redhat.com> – 1:1.0.1e-10
– Perl 5.18 rebuild
* Thu Jul 11 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-9
– add openssl.cnf.5 manpage symlink to config.5
* Wed Jul 10 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-8
– add relro linking flag
* Wed Jul 10 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-7
– add support for the -trusted_first option for certificate chain verification
* Fri May  3 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-6
– fix build of manual pages with current pod2man (#959439)
* Sun Apr 21 2013 Peter Robinson <pbrobinson@fedoraproject.org> 1.0.1e-5
– Enable ARM optimised build
* Mon Mar 18 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-4
– fix random bad record mac errors (#918981)
* Tue Feb 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-3
– fix up the SHLIB_VERSION_NUMBER
* Tue Feb 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-2
– disable ZLIB loading by default (due to CRIME attack)
* Tue Feb 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-1
– new upstream version
* Wed Jan 30 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1c-12
– more fixes from upstream
– fix errors in manual causing build failure (#904777)
* Fri Dec 21 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-11
– add script for renewal of a self-signed cert by Philip Prindeville (#871566)
– allow X509_issuer_and_serial_hash() produce correct result in
  the FIPS mode (#881336)
* Thu Dec  6 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-10
– do not load default verify paths if CApath or CAfile specified (#884305)
* Tue Nov 20 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-9
– more fixes from upstream CVS
– fix DSA key pairwise check (#878597)
* Thu Nov 15 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-8
– use 1024 bit DH parameters in s_server as 512 bit is not allowed
  in FIPS mode and it is quite weak anyway
* Mon Sep 10 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-7
– add missing initialization of str in aes_ccm_init_key (#853963)
– add important patches from upstream CVS
– use the secure_getenv() with new glibc
——————————————————————————–
References:

  [ 1 ] Bug #1047840 – CVE-2013-6450 openssl: crash in DTLS renegotiation after packet loss
        https://bugzilla.redhat.com/show_bug.cgi?id=1047840
  [ 2 ] Bug #1049058 – CVE-2013-4353 openssl: client NULL dereference crash on malformed handshake packets
        https://bugzilla.redhat.com/show_bug.cgi?id=1049058
——————————————————————————–

This update can be installed with the “yum” update program.  Use
su -c ‘yum update openssl’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2014-01-0012-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa libjpeg-turbo

Otkriveni su propusti kod programske biblioteke libjpeg-turbo za Fedoru 19. Propusti su uzrokovani neispravnim upravljanjem određenim memorijskim operacijama, što je...

Close