diff options
author | Adrien Nader <adrien@notk.org> | 2013-02-10 00:52:09 +0100 |
---|---|---|
committer | Adrien Nader <adrien@notk.org> | 2013-02-10 00:52:09 +0100 |
commit | 2892086e8aaa7398b7a9a9cdc3bf6a934506238f (patch) | |
tree | bba53d082bd25686c392282284b31a94ee9d7561 /slackware64-current/slackware64/kde/oxygen-gtk3-1.1.1-x86_64-1.txz | |
parent | 2f46173b5612e7cd5f262732cfe1920dcd09cd46 (diff) |
Sat Feb 9 21:45:56 UTC 2013
a/openssl-solibs-1.0.1d-x86_64-1.txz: Upgraded.
(* Security fix *)
l/phonon-gstreamer-4.6.3-x86_64-1.txz: Upgraded.
n/openssl-1.0.1d-x86_64-1.txz: Upgraded.
Make the decoding of SSLv3, TLS and DTLS CBC records constant time.
This addresses the flaw in CBC record processing discovered by
Nadhem Alfardan and Kenny Paterson. Details of this attack can be found
at: http://www.isg.rhul.ac.uk/tls/
Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
Security Group at Royal Holloway, University of London
(www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and
Emilia Käsper for the initial patch.
(CVE-2013-0169)
[Emilia Käsper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson]
Fix flaw in AESNI handling of TLS 1.2 and 1.1 records for CBC mode
ciphersuites which can be exploited in a denial of service attack.
Thanks go to and to Adam Langley <agl@chromium.org> for discovering
and detecting this bug and to Wolfgang Ettlinger
<wolfgang.ettlinger@gmail.com> for independently discovering this issue.
(CVE-2012-2686)
[Adam Langley]
Return an error when checking OCSP signatures when key is NULL.
This fixes a DoS attack. (CVE-2013-0166)
[Steve Henson]
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2686
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169
(* Security fix *)
Diffstat (limited to 'slackware64-current/slackware64/kde/oxygen-gtk3-1.1.1-x86_64-1.txz')
0 files changed, 0 insertions, 0 deletions