pkgsrc/emulators/suse131_openssl/distinfo
obache 1a2985aa3f Apply following security update to suse131_openssl, bump PKGREVISION to 10.
openSUSE Security Update: update for openssl
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2014:1331-1
Rating:             important
References:         #901223 #901277
Cross-References:   CVE-2014-3513 CVE-2014-3566 CVE-2014-3567
                    CVE-2014-3568
Affected Products:
                    openSUSE 13.1
                    openSUSE 12.3
______________________________________________________________________________

   An update that fixes four vulnerabilities is now available.

Description:

   The following issues were fixed in this release:

   CVE-2014-3566: SSLv3 POODLE attack (bnc#901223) CVE-2014-3513,
   CVE-2014-3567:  DTLS memory leak and session ticket memory leak
2014-11-03 09:28:39 +00:00

8 lines
601 B
Text

$NetBSD: distinfo,v 1.11 2014/11/03 09:28:39 obache Exp $
SHA1 (suse131/libopenssl1_0_0-1.0.1j-11.56.1.i586.rpm) = 0ed8165a82d1824cd7e8da57ea06be8a33ef8013
RMD160 (suse131/libopenssl1_0_0-1.0.1j-11.56.1.i586.rpm) = fa986feaea4b2ee0c18c34e78796012a997a2e6b
Size (suse131/libopenssl1_0_0-1.0.1j-11.56.1.i586.rpm) = 769224 bytes
SHA1 (suse131/libopenssl1_0_0-1.0.1j-11.56.1.x86_64.rpm) = d41f9c28a3b78b4b510d00a82b57afe40eaa9729
RMD160 (suse131/libopenssl1_0_0-1.0.1j-11.56.1.x86_64.rpm) = 70f16e4a41e26f285cf9fe49d212f751d25d11c9
Size (suse131/libopenssl1_0_0-1.0.1j-11.56.1.x86_64.rpm) = 818911 bytes