File _patchinfo of Package patchinfo.1345
<patchinfo> <issue id="802648" tracker="bnc">VUL-0: CVE-2013-0169: openssl 1.0.1d/1.0.0k/0.9.8y release (lucky thirteen 13)</issue> <issue id="802746" tracker="bnc">VUL-0: CVE-2013-0166: openssl: OCSP invalid key DoS issue</issue> <issue id="757773" tracker="bnc">ldap-client yast module requires certificates with "*.pem" name schema</issue> <issue id="CVE-2012-0027" tracker="cve" /> <issue id="CVE-2011-4577" tracker="cve" /> <issue id="CVE-2011-4576" tracker="cve" /> <issue id="CVE-2012-1165" tracker="cve" /> <issue id="CVE-2011-4108" tracker="cve" /> <issue id="CVE-2013-0166" tracker="cve" /> <issue id="CVE-2012-0050" tracker="cve" /> <issue id="CVE-2012-2686" tracker="cve" /> <issue id="CVE-2012-2110" tracker="cve" /> <issue id="CVE-2013-0169" tracker="cve" /> <issue id="CVE-2012-0884" tracker="cve" /> <issue id="CVE-2011-4619" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>msmeissn</packager> <description> openssl was updated to 1.0.0k security release to fix bugs and security issues. (bnc#802648 bnc#802746) The version was upgraded to avoid backporting the large fixes for SSL, TLS and DTLS Plaintext Recovery Attack (CVE-2013-0169) TLS 1.1 and 1.2 AES-NI crash (CVE-2012-2686) OCSP invalid key DoS issue (CVE-2013-0166) Also the following bugfix was included: bnc#757773 - c_rehash to accept more filename extensions </description> <summary>openssl: security and bugfix update to 1.0.0k</summary> </patchinfo>