Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=726865b891c8592f69cf8bd0f3d89ebe7cbc2a43

commit 726865b891c8592f69cf8bd0f3d89ebe7cbc2a43
Author: kikadf <kikadf...@gmail.com>
Date:   Sun Jan 12 17:32:18 2014 +0100

Fix FSA764

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 947e8d3..3628f18 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -38,7 +38,7 @@
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450</cve>
<desc>Anton Johansson discovered that an invalid TLS handshake package could 
crash OpenSSL with a NULL pointer dereference.
Multiple security issues have been fixed in OpenSSL: The TLS 1.2 support was 
susceptible to denial of service and retransmission of DTLS messages was fixed.
-                       In addition this update disables the insecure 
Dual_EC_DRBG algorithm (which was unused anyway, see 
http://marc.info/?l=openssl-announce&m=138747119822324&w=2 for further 
information) and no longer uses the RdRand feature available on some Intel CPUs 
as a sole source of entropy unless explicitly requested.</desc>
+                       In addition this update disables the insecure 
Dual_EC_DRBG algorithm and no longer uses the RdRand feature available on some 
Intel CPUs as a sole source of entropy unless explicitly requested.</desc>
</fsa>
<fsa>
<id>763</id>
_______________________________________________
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to