Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in OpenSSL
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in OpenSSL
ID: FEDORA-2012-6343
Distribution: Fedora
Plattformen: Fedora 17
Datum: Fr, 27. April 2012, 09:12
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110
Applikationen: OpenSSL

Originalnachricht

Name        : openssl
Product : Fedora 17
Version : 1.0.0i
Release : 1.fc17
URL : http://www.openssl.org/
Summary : A general purpose cryptography library with TLS implementation
Description :
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and
protocols.

-------------------------------------------------------------------------------
-
Update Information:

Upstream security update fixing CVE-2012-2110 - memory corruption in when
reading ASN.1 structures through BIO interface.

-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #814185 - CVE-2012-2110 openssl: asn1_d2i_read_bio integer errors
leading to buffer overflow
https://bugzilla.redhat.com/show_bug.cgi?id=814185
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update openssl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung