--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2024-5f0c4ba4b8
2024-09-12 00:36:28.099422
--------------------------------------------------------------------------------

Name        : wolfssl
Product     : Fedora EPEL 9
Version     : 5.7.2
Release     : 2.el9
URL         : https://github.com/wolfSSL/wolfssl
Summary     : Lightweight SSL/TLS library written in ANSI C
Description :
The wolfSSL embedded SSL library (formerly CyaSSL) is a lightweight SSL/TLS
library written in ANSI C and targeted for embedded, RTOS, and
resource-constrained environments - primarily because of its small size,
speed, and feature set. It is commonly used in standard operating environments
as well because of its royalty-free pricing and excellent cross platform
support. wolfSSL supports industry standards up to the current TLS 1.3 and
DTLS 1.3, is up to 20 times smaller than OpenSSL, and offers progressive
ciphers such as ChaCha20, Curve25519, Blake2b and Post-Quantum TLS 1.3 groups.
User bench-marking and feedback reports dramatically better performance when
using wolfSSL over OpenSSL.

wolfSSL is powered by the wolfCrypt cryptography library. Two versions of
wolfCrypt have been FIPS 140-2 validated (Certificate #2425 and certificate

visit the wolfCrypt FIPS FAQ or contact [email protected].

--------------------------------------------------------------------------------
Update Information:

RHBZ#2308628 RHBZ#2308629 RHBZ#2308630 RHBZ#2308631 fixed in 5.7.2 release
--------------------------------------------------------------------------------
ChangeLog:

* Tue Sep  3 2024 Andrew Bauer <[email protected]> - 5.7.2-2
- RHBZ#2308628 RHBZ#2308629 RHBZ#2308630 RHBZ#2308631 fixed in 5.7.2 release
- fips macro patch no longer needed
* Sun Aug 25 2024 Andrew Bauer <[email protected]> - 5.7.2-1
- 5.7.2 release
- patch FIPS_VERSION3_GE macro issue
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2308628 - CVE-2024-1543 wolfssl: The side-channel protected 
T-Table implementation in wolfSSL [fedora-39]
        https://bugzilla.redhat.com/show_bug.cgi?id=2308628
  [ 2 ] Bug #2308629 - CVE-2024-1543 wolfssl: The side-channel protected 
T-Table implementation in wolfSSL [fedora-40]
        https://bugzilla.redhat.com/show_bug.cgi?id=2308629
  [ 3 ] Bug #2308630 - CVE-2024-1545 wolfssl: Fault Injection vulnerability in 
RsaPrivateDecryption function in wolfssl/wolfcrypt/src/rsa.c in WolfSSL 
[fedora-39]
        https://bugzilla.redhat.com/show_bug.cgi?id=2308630
  [ 4 ] Bug #2308631 - CVE-2024-1545 wolfssl: Fault Injection vulnerability in 
RsaPrivateDecryption function in wolfssl/wolfcrypt/src/rsa.c in WolfSSL 
[fedora-40]
        https://bugzilla.redhat.com/show_bug.cgi?id=2308631
--------------------------------------------------------------------------------

This update can be installed with the "yum" update programs.  Use
su -c 'yum update wolfssl' at the command line.
For more information, refer to "YUM", available at
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7\
/html/System_Administrators_Guide/ch-yum.html

All packages are signed with the Fedora EPEL GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------

-- 
_______________________________________________
epel-package-announce mailing list -- 
[email protected]
To unsubscribe send an email to 
[email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to