[SECURITY] Fedora 21 Update: openssl-1.0.1k-11.fc21

updates at fedoraproject.org updates at fedoraproject.org
Mon Jul 13 19:12:30 UTC 2015

Fedora Update Notification
2015-07-13 16:44:40

Name        : openssl
Product     : Fedora 21
Version     : 1.0.1k
Release     : 11.fc21
URL         : http://www.openssl.org/
Summary     : Utilities from the general purpose cryptography library with TLS implementation
Description :
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and

Update Information:

Security fix for CVE-2015-1793 high severity issue.

* Thu Jul  9 2015 Tomáš Mráz <tmraz at redhat.com> 1.0.1k-11
- fix CVE-2015-1793 - certificate verification forgery
* Mon Jun 15 2015 Tomáš Mráz <tmraz at redhat.com> 1.0.1k-10
- fix CVE-2015-1789 - out-of-bounds read in X509_cmp_time
- fix CVE-2015-1790 - PKCS7 crash with missing EncryptedContent
- fix CVE-2015-1791 - race condition handling NewSessionTicket
- fix CVE-2015-1792 - CMS verify infinite loop with unknown hash function
- add missing parts of CVE-2015-0209 fix for corectness although unexploitable
* Fri May 29 2015 Tomáš Mráz <tmraz at redhat.com> 1.0.1k-9
- fix CVE-2015-4000 - prevent the logjam attack on client - restrict
  the DH key size to at least 768 bits (limit will be increased in future)
* Thu Apr 30 2015 Tomáš Mráz <tmraz at redhat.com> 1.0.1k-8
- try to find alternative cert chains (#1166614)
* Thu Apr  9 2015 Tomáš Mráz <tmraz at redhat.com> 1.0.1k-7
- drop the AES-GCM restriction of 2^32 operations because the IV is
  always 96 bits (32 bit fixed field + 64 bit invocation field)
* Thu Mar 19 2015 Tomáš Mráz <tmraz at redhat.com> 1.0.1k-6
- fix CVE-2015-0209 - potential use after free in d2i_ECPrivateKey()
- fix CVE-2015-0286 - improper handling of ASN.1 boolean comparison
- fix CVE-2015-0287 - ASN.1 structure reuse decoding memory corruption
- fix CVE-2015-0289 - NULL dereference decoding invalid PKCS#7 data
- fix CVE-2015-0293 - triggerable assert in SSLv2 server
* Mon Mar 16 2015 Tomáš Mráz <tmraz at redhat.com> 1.0.1k-5
- fix bug in the CRYPTO_128_unwrap()
* Fri Feb 27 2015 Tomáš Mráz <tmraz at redhat.com> 1.0.1k-4
- fix bug in the RFC 5649 support (#1185878)
* Sat Feb 21 2015 Till Maas <opensource at till.name> - 1:1.0.1k-3
- Rebuilt for Fedora 23 Change
* Thu Jan 15 2015 Tomáš Mráz <tmraz at redhat.com> 1.0.1k-2
- test in the non-FIPS RSA keygen for minimal distance of p and q
  similarly to the FIPS RSA keygen
* Fri Jan  9 2015 Tomáš Mráz <tmraz at redhat.com> 1.0.1k-1
- new upstream release fixing multiple security issues
* Tue Oct 21 2014 Tomáš Mráz <tmraz at redhat.com> 1.0.1j-2
- update the FIPS RSA keygen to be FIPS 186-4 compliant

  [ 1 ] Bug #1238619 - CVE-2015-1793 openssl: alternative chains certificate forgery

This update can be installed with the "yum" update program.  Use
su -c 'yum update openssl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at

More information about the package-announce mailing list