[SECURITY] Fedora 20 Update: openssl-1.0.1e-41.fc20

updates at fedoraproject.org updates at fedoraproject.org
Tue Jan 20 21:05:44 UTC 2015


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2015-0601
2015-01-14 06:24:54
--------------------------------------------------------------------------------

Name        : openssl
Product     : Fedora 20
Version     : 1.0.1e
Release     : 41.fc20
URL         : http://www.openssl.org/
Summary     : Utilities from the general purpose cryptography library with TLS implementation
Description :
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and
protocols.

--------------------------------------------------------------------------------
Update Information:

Multiple low and moderate impact security issues fixed.

--------------------------------------------------------------------------------
ChangeLog:

* Tue Jan 13 2015 Tomáš Mráz <tmraz at redhat.com> 1.0.1e-41
- fix CVE-2014-3570 - incorrect computation in BN_sqr()
- fix CVE-2014-3571 - possible crash in dtls1_get_record()
- fix CVE-2014-3572 - possible downgrade of ECDH ciphersuite to non-PFS state
- fix CVE-2014-8275 - various certificate fingerprint issues
- fix CVE-2015-0204 - remove support for RSA ephemeral keys for non-export
  ciphersuites and on server
- fix CVE-2015-0205 - do not allow unauthenticated client DH certificate
- fix CVE-2015-0206 - possible memory leak when buffering DTLS records
- add ECC TLS extensions to DTLS (#1119803)
- do not send ECC ciphersuites in SSLv2 client hello (#1090955)
- copy digest algorithm when handling SNI context switch
* Thu Oct 16 2014 Tomáš Mráz <tmraz at redhat.com> 1.0.1e-40
- fix CVE-2014-3567 - memory leak when handling session tickets
- fix CVE-2014-3513 - memory leak in srtp support
- add support for fallback SCSV to partially mitigate CVE-2014-3566
  (padding attack on SSL3)
- print ephemeral key size negotiated in TLS handshake (#1057715)
* Fri Aug  8 2014 Tomáš Mráz <tmraz at redhat.com> 1.0.1e-39
- fix CVE-2014-3505 - doublefree in DTLS packet processing
- fix CVE-2014-3506 - avoid memory exhaustion in DTLS
- fix CVE-2014-3507 - avoid memory leak in DTLS
- fix CVE-2014-3508 - fix OID handling to avoid information leak
- fix CVE-2014-3509 - fix race condition when parsing server hello
- fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS
- fix CVE-2014-3511 - disallow protocol downgrade via fragmentation
* Thu Jun  5 2014 Tomáš Mráz <tmraz at redhat.com> 1.0.1e-38
- fix CVE-2010-5298 - possible use of memory after free
- fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment
- fix CVE-2014-0198 - possible NULL pointer dereference
- fix CVE-2014-0221 - DoS from invalid DTLS handshake packet
- fix CVE-2014-0224 - SSL/TLS MITM vulnerability
- fix CVE-2014-3470 - client-side DoS when using anonymous ECDH
* Mon Apr  7 2014 Dennis Gilmore <dennis at ausil.us> - 1.0.1e-37.1
- pull in upstream patch for CVE-2014-0160
- removed CHANGES file portion from patch for expediency
* Tue Jan  7 2014 Tomáš Mráz <tmraz at redhat.com> 1.0.1e-37
- fix CVE-2013-4353 - Invalid TLS handshake crash
- fix CVE-2013-6450 - possible MiTM attack on DTLS1
* Fri Dec 20 2013 Tomáš Mráz <tmraz at redhat.com> 1.0.1e-36
- fix CVE-2013-6449 - crash when version in SSL structure is incorrect
- more FIPS validation requirement changes
- do not apply the no-md5-verify patch in released Fedora branches
* Wed Dec 18 2013 Tomáš Mráz <tmraz at redhat.com> 1.0.1e-35
- drop weak ciphers from the default TLS ciphersuite list
- add back some symbols that were dropped with update to 1.0.1 branch
- more FIPS validation requirement changes
* Tue Nov 19 2013 Tomáš Mráz <tmraz at redhat.com> 1.0.1e-34
- fix locking and reseeding problems with FIPS drbg
* Fri Nov 15 2013 Tomáš Mráz <tmraz at redhat.com> 1.0.1e-33
- additional changes required for FIPS validation
* Wed Nov 13 2013 Tomáš Mráz <tmraz at redhat.com> 1.0.1e-32
- disable verification of certificate, CRL, and OCSP signatures
  using MD5 if OPENSSL_ENABLE_MD5_VERIFY environment variable
  is not set
* Fri Nov  8 2013 Tomáš Mráz <tmraz at redhat.com> 1.0.1e-31
- add back support for secp521r1 EC curve
- add aarch64 to Configure (#969692)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1180234 - CVE-2014-3571 openssl: DTLS segmentation fault in dtls1_get_record
        https://bugzilla.redhat.com/show_bug.cgi?id=1180234
  [ 2 ] Bug #1180239 - CVE-2015-0205 openssl: DH client certificates accepted without verification
        https://bugzilla.redhat.com/show_bug.cgi?id=1180239
  [ 3 ] Bug #1180187 - CVE-2014-8275 openssl: Fix various certificate fingerprint issues
        https://bugzilla.redhat.com/show_bug.cgi?id=1180187
  [ 4 ] Bug #1180235 - CVE-2015-0206 openssl: DTLS memory leak in dtls1_buffer_record
        https://bugzilla.redhat.com/show_bug.cgi?id=1180235
  [ 5 ] Bug #1180240 - CVE-2014-3570 openssl: Bignum squaring may produce incorrect results
        https://bugzilla.redhat.com/show_bug.cgi?id=1180240
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use
su -c 'yum update openssl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list