SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for compat-openssl097g-0.9.7g-155.2.1.x86_64.rpm :
Thu Jul 21 14:00:00 2011 gjheAATTnovell.com
- batch sync with fixes of openssl from year 2007 to now(2011)

* openssl-cipher_selection_backport_from_sle10sp3.patch

* openssl-0.9.7d-CVE-2008-5077.patch

* openssl-CVE-2009-0590.patch

* openssl-CVE-2009-0789.patch

* openssl-CVE-2009-3555.patch

* CVE-2010-4180.patch

Wed Jan 27 13:00:00 2010 jengelhAATTmedozas.de
- package baselibs.conf

Tue Nov 3 13:00:00 2009 cooloAATTnovell.com
- updated patches to apply with fuzz=0

Wed Aug 26 14:00:00 2009 mlsAATTsuse.de
- make patch0 usage consistent

Wed Dec 10 13:00:00 2008 olhAATTsuse.de
- use Obsoletes: -XXbit only for ppc64 to help solver during distupgrade
(bnc#437293)

Thu Oct 30 13:00:00 2008 olhAATTsuse.de
- obsolete old -XXbit packages (bnc#437293)

Thu Apr 10 14:00:00 2008 roAATTsuse.de
- added baselibs.conf file to build xxbit packages
for multilib support

Thu Feb 28 13:00:00 2008 mkoenigAATTsuse.de
- fix buffer overflow CVE-2007-5135 [#329208]

Wed Oct 4 14:00:00 2006 poemlAATTsuse.de
- an attacker could send a list of ciphers that would overrun a
buffer in SSL_get_shared_ciphers() CVE-2006-3738 [#202366]
- fix possible crash in SSLv2 client triggerable by a malicious
server. CVE-2006-4343 [#202366]
- fix mishandling of an error condition in parsing of certain
invalid ASN1 structures, which could result in an infinite loop
which consumes system memory. CVE-2006-2937 [#202366]
- Certain types of public key can take disproportionate amounts of
time to process. This could be used by an attacker in a denial of
service attack. CVE-2006-2940 [#207635]
- add fix for the CVE-2006-2940 patch: the newly introduced limit
on DH modulus size could lead to a crash when exerted. [#208971]
- security vulnerability which could allow RSA Signature Forgery,
fix from 0.9.8c. CVE-2006-4339 [#203595]

Wed May 17 14:00:00 2006 schwabAATTsuse.de
- Don\'t strip binaries.


 
ICM