Branches for Quantal

Name Status Last Modified Last Commit
lp://staging/ubuntu/quantal/openssl 2 Mature 2012-10-04 10:34:57 UTC
85. [ Tyler Hicks <tyhicks@canonical.com>...

Author: Tyler Hicks
Revision Date: 2012-10-04 10:34:57 UTC

[ Tyler Hicks <tyhicks@canonical.com> ]
* debian/patches/tls12_workarounds.patch: Readd the change to check
  TLS1_get_client_version rather than TLS1_get_version to fix incorrect
  client hello cipher list truncation when TLS 1.1 and lower is in use.
  (LP: #1051892)

[ Micah Gersten <micahg@ubuntu.com> ]
* Mark Debian Vcs-* as XS-Debian-Vcs-*
  - update debian/control

lp://staging/ubuntu/quantal-proposed/openssl 2 Mature 2013-12-11 06:24:33 UTC
89. * SECURITY UPDATE: Disable compressio...

Author: Seth Arnold
Revision Date: 2013-06-03 18:13:33 UTC

* SECURITY UPDATE: Disable compression to avoid CRIME systemwide
  (LP: #1187195)
  - CVE-2012-4929
  - debian/patches/openssl-1.0.1e-env-zlib.patch: disable default use of
    zlib to compress SSL/TLS unless the environment variable
    OPENSSL_DEFAULT_ZLIB is set in the environment during library
    initialization.
  - Introduced to assist with programs not yet updated to provide their own
    controls on compression, such as Postfix
  - http://pkgs.fedoraproject.org/cgit/openssl.git/plain/openssl-1.0.1e-env-zlib.patch

lp://staging/ubuntu/quantal-security/openssl bug 2 Mature 2014-05-02 15:27:44 UTC
92. * SECURITY UPDATE: denial of service ...

Author: Marc Deslauriers
Revision Date: 2014-05-02 15:27:44 UTC

* SECURITY UPDATE: denial of service via use after free
  - debian/patches/CVE-2010-5298.patch: check s->s3->rbuf.left before
    releasing buffers in ssl/s3_pkt.c.
  - CVE-2010-5298
* SECURITY UPDATE: denial of service via null pointer dereference
  - debian/patches/CVE-2014-0198.patch: if buffer was released, get a new
    one in ssl/s3_pkt.c.
  - CVE-2014-0198

lp://staging/ubuntu/quantal-updates/openssl 2 Mature 2014-05-02 15:27:44 UTC
92. * SECURITY UPDATE: denial of service ...

Author: Marc Deslauriers
Revision Date: 2014-05-02 15:27:44 UTC

* SECURITY UPDATE: denial of service via use after free
  - debian/patches/CVE-2010-5298.patch: check s->s3->rbuf.left before
    releasing buffers in ssl/s3_pkt.c.
  - CVE-2010-5298
* SECURITY UPDATE: denial of service via null pointer dereference
  - debian/patches/CVE-2014-0198.patch: if buffer was released, get a new
    one in ssl/s3_pkt.c.
  - CVE-2014-0198

14 of 4 results