File _patchinfo of Package patchinfo.2956
<patchinfo>
<issue id="890767" tracker="bnc"/>
<issue id="890768" tracker="bnc"/>
<issue id="890769" tracker="bnc"/>
<issue id="890764" tracker="bnc"/>
<issue id="890766" tracker="bnc"/>
<issue id="890770" tracker="bnc"/>
<issue id="890771" tracker="bnc"/>
<issue id="890772" tracker="bnc"/>
<issue id="890765" tracker="bnc"/>
<issue id="CVE-2014-3505" tracker="cve" />
<issue id="CVE-2014-3506" tracker="cve" />
<issue id="CVE-2014-3507" tracker="cve" />
<issue id="CVE-2014-3512" tracker="cve" />
<issue id="CVE-2014-3511" tracker="cve" />
<issue id="CVE-2014-3510" tracker="cve" />
<issue id="CVE-2014-3508" tracker="cve" />
<issue id="CVE-2014-3509" tracker="cve" />
<issue id="CVE-2014-5139" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>elvigia</packager>
<description>This openssl update fixes the following security issues:
- openssl 1.0.1i
* Information leak in pretty printing functions (CVE-2014-3508)
* Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139)
* Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)
* Double Free when processing DTLS packets (CVE-2014-3505)
* DTLS memory exhaustion (CVE-2014-3506)
* DTLS memory leak from zero-length fragments (CVE-2014-3507)
* OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)
* OpenSSL TLS protocol downgrade attack (CVE-2014-3511)
* SRP buffer overrun (CVE-2014-3512)
</description>
<summary>update for openssl</summary>
</patchinfo>