Dear OpenSSL follower,
ondruska just announced version 1.0.1f of OpenSSL on Freecode.
The release notes for this version are as follows:
A TLS record tampering bug was fixed. A carefully crafted invalid handshake
could crash OpenSSL with a NULL pointer exception (CVE-2013-4353). Original DTLS
digest and encryption contexts are kept in retransmission structures so that the
previous session parameters can be used if they need to be re-sent
(CVE-2013-6450). A SSL_OP_SAFARI_ECDHE_ECDSA_BUG option (part of SSL_OP_ALL)
which avoids preferring ECDHE-ECDSA ciphers when the client appears to be Safari
on OS X was added.
Project description:
The OpenSSL Project is a collaborative effort to
develop a robust, commercial-grade, fully
featured, and Open Source toolkit implementing the
Secure Sockets Layer (SSL v2/v3) and Transport
Layer Security (TLS v1) as well as a full-strength
general-purpose cryptography library.
Detailed history and release notes are available here:
http://freecode.com/projects/openssl#release_360531
If you want to unfollow this project, please log in to:
http://freecode.com/account/subscriptions
Best regards,
Freecode
--
This email was sent to [email protected].
Geeknet, Inc. | 594 Howard Street, Suite 300 | San Francisco, CA 94105
Privacy Policy: http://geek.net/privacy-statement
--
http://linuxfromscratch.org/mailman/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page