Sicherheit: Pufferüberlauf in OpenSSL
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in OpenSSL
ID: FEDORA-2012-6403
Distribution: Fedora
Plattformen: Fedora 16
Datum: Sa, 28. April 2012, 09:52
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110
Applikationen: OpenSSL


Name        : openssl
Product : Fedora 16
Version : 1.0.0i
Release : 1.fc16
URL : http://www.openssl.org/
Summary : A general purpose cryptography library with TLS implementation
Description :
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and

Update Information:

Upstream security update fixing CVE-2012-2110 - memory corruption in when
reading ASN.1 structures through BIO interface.


* Fri Apr 20 2012 Tomas Mraz <tmraz@redhat.com> 1.0.0i-1
- new upstream release fixing CVE-2012-2110 - memory corruption
when loading asn1 from BIO
* Fri Mar 23 2012 Tomas Mraz <tmraz@redhat.com> 1.0.0h-1
- new upstream release fixing CVE-2012-0884 - Bleichenbacher attack
against PKCS#7 and CMS (#802725) and CVE-2012-1165 mime_param_cmp
NULL dereference (#802489)
* Thu Jan 19 2012 Tomas Mraz <tmraz@redhat.com> 1.0.0g-1
- new upstream release fixing CVE-2012-0050 - DoS regression in
DTLS support introduced by the previous release (#782795)
* Thu Jan 5 2012 Tomas Mraz <tmraz@redhat.com> 1.0.0f-1
- new upstream release fixing multiple CVEs
* Tue Nov 22 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-4
- move the libraries needed for static linking to Libs.private
* Thu Nov 3 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-3
- do not use AVX instructions when osxsave bit not set
- add direct known answer tests for SHA2 algorithms
* Wed Sep 21 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-2
- fix missing initialization of variable in CHIL engine

[ 1 ] Bug #814185 - CVE-2012-2110 openssl: asn1_d2i_read_bio integer errors
leading to buffer overflow

This update can be installed with the "yum" update program. Use
su -c 'yum update openssl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Pro-Linux @Facebook
Neue Nachrichten