-------------------------------------------------------------------------------- Fedora EPEL Update Notification FEDORA-EPEL-2024-5f0c4ba4b8 2024-09-12 00:36:28.099422 --------------------------------------------------------------------------------
Name : wolfssl Product : Fedora EPEL 9 Version : 5.7.2 Release : 2.el9 URL : https://github.com/wolfSSL/wolfssl Summary : Lightweight SSL/TLS library written in ANSI C Description : The wolfSSL embedded SSL library (formerly CyaSSL) is a lightweight SSL/TLS library written in ANSI C and targeted for embedded, RTOS, and resource-constrained environments - primarily because of its small size, speed, and feature set. It is commonly used in standard operating environments as well because of its royalty-free pricing and excellent cross platform support. wolfSSL supports industry standards up to the current TLS 1.3 and DTLS 1.3, is up to 20 times smaller than OpenSSL, and offers progressive ciphers such as ChaCha20, Curve25519, Blake2b and Post-Quantum TLS 1.3 groups. User bench-marking and feedback reports dramatically better performance when using wolfSSL over OpenSSL. wolfSSL is powered by the wolfCrypt cryptography library. Two versions of wolfCrypt have been FIPS 140-2 validated (Certificate #2425 and certificate visit the wolfCrypt FIPS FAQ or contact [email protected]. -------------------------------------------------------------------------------- Update Information: RHBZ#2308628 RHBZ#2308629 RHBZ#2308630 RHBZ#2308631 fixed in 5.7.2 release -------------------------------------------------------------------------------- ChangeLog: * Tue Sep 3 2024 Andrew Bauer <[email protected]> - 5.7.2-2 - RHBZ#2308628 RHBZ#2308629 RHBZ#2308630 RHBZ#2308631 fixed in 5.7.2 release - fips macro patch no longer needed * Sun Aug 25 2024 Andrew Bauer <[email protected]> - 5.7.2-1 - 5.7.2 release - patch FIPS_VERSION3_GE macro issue -------------------------------------------------------------------------------- References: [ 1 ] Bug #2308628 - CVE-2024-1543 wolfssl: The side-channel protected T-Table implementation in wolfSSL [fedora-39] https://bugzilla.redhat.com/show_bug.cgi?id=2308628 [ 2 ] Bug #2308629 - CVE-2024-1543 wolfssl: The side-channel protected T-Table implementation in wolfSSL [fedora-40] https://bugzilla.redhat.com/show_bug.cgi?id=2308629 [ 3 ] Bug #2308630 - CVE-2024-1545 wolfssl: Fault Injection vulnerability in RsaPrivateDecryption function in wolfssl/wolfcrypt/src/rsa.c in WolfSSL [fedora-39] https://bugzilla.redhat.com/show_bug.cgi?id=2308630 [ 4 ] Bug #2308631 - CVE-2024-1545 wolfssl: Fault Injection vulnerability in RsaPrivateDecryption function in wolfssl/wolfcrypt/src/rsa.c in WolfSSL [fedora-40] https://bugzilla.redhat.com/show_bug.cgi?id=2308631 -------------------------------------------------------------------------------- This update can be installed with the "yum" update programs. Use su -c 'yum update wolfssl' at the command line. For more information, refer to "YUM", available at https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7\ /html/System_Administrators_Guide/ch-yum.html All packages are signed with the Fedora EPEL GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- -- _______________________________________________ epel-package-announce mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/[email protected] Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
