You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa openssl

Sigurnosni nedostaci programskog paketa openssl

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

– – ————————————————————————-
Debian Security Advisory DSA-2950-2 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
June 16, 2014 http://www.debian.org/security/faq
– – ————————————————————————-

Package : openssl
CVE ID : CVE-2014-0195 CVE-2014-0221 CVE-2014-0224 CVE-2014-3470

This update updates the upstream fix for CVE-2014-0224 to address
problems with CCS which could result in problems with the Postgres
database.

In addition this update disables ZLIB compress by default. If you need
to re-enable it for some reason, you can set the environment variable
OPENSSL_NO_DEFAULT_ZLIB.

This update also fixes a header declaration which could result in
build failures in applications using OpenSSL.

For the stable distribution (wheezy), these problems have been fixed in
version 1.0.1e-2+deb7u11.

We recommend that you upgrade your openssl packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=lJYd
—–END PGP SIGNATURE—–


To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of “unsubscribe”. Trouble? Contact listmaster@lists.debian.org
Archive: https://lists.debian.org/20140616182111.GA2322@pisco.westfalen.local

AutorMarko Stanec
Cert idNCERT-REF-2014-06-0035-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa memcached

Otkriveni su sigurnosni nedostaci u programskom paketu memcached za operacijski sustav Gentoo. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog...

Close