drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in OpenSSL
Name: |
Pufferüberlauf in OpenSSL |
|
ID: |
FEDORA-2012-6343 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 17 |
|
Datum: |
Fr, 27. April 2012, 09:12 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110 |
|
Applikationen: |
OpenSSL |
|
Originalnachricht |
Name : openssl Product : Fedora 17 Version : 1.0.0i Release : 1.fc17 URL : http://www.openssl.org/ Summary : A general purpose cryptography library with TLS implementation Description : The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols.
------------------------------------------------------------------------------- - Update Information:
Upstream security update fixing CVE-2012-2110 - memory corruption in when reading ASN.1 structures through BIO interface.
------------------------------------------------------------------------------- - References:
[ 1 ] Bug #814185 - CVE-2012-2110 openssl: asn1_d2i_read_bio integer errors leading to buffer overflow https://bugzilla.redhat.com/show_bug.cgi?id=814185 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update openssl' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|