- Issued:
- 2004-12-21
- Updated:
- 2004-12-21
RHEA-2004:603 - Product Enhancement Advisory
Synopsis
New perl-Crypt-SSLeay package
Type/Severity
Product Enhancement Advisory
Topic
A new perl-Crypt-SSLeay package that allows for SSL encryption of network
traffic by perl modules is now available.
Description
This newly added perl module provides support for the HTTPS protocol under
LWP, so that a LWP::UserAgent can make HTTPS GET, HEAD, and POST requests.
Please see perldoc LWP for more information on POST requests.
The Crypt::SSLeay package contains Net::SSL, which is automatically loaded
by LWP::Protocol::https on HTTPS requests, and provides the necessary SSL
glue for the module to work.
The perl-Crypt-SSLeay package allows for SSL communication via perl
modules. This also enables various perl modules such as LWP to work
transparently with HTTPS URLs.
All users requiring perl-Crypt-SSLeay functionality should install this
newly added package.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
Affected Products
- Red Hat Enterprise Linux Server 3 x86_64
- Red Hat Enterprise Linux Server 3 ia64
- Red Hat Enterprise Linux Server 3 i386
- Red Hat Enterprise Linux Workstation 3 x86_64
- Red Hat Enterprise Linux Workstation 3 ia64
- Red Hat Enterprise Linux Workstation 3 i386
- Red Hat Enterprise Linux Desktop 3 x86_64
- Red Hat Enterprise Linux Desktop 3 i386
- Red Hat Enterprise Linux for IBM z Systems 3 s390x
- Red Hat Enterprise Linux for IBM z Systems 3 s390
- Red Hat Enterprise Linux for Power, big endian 3 ppc
Fixes
(none)CVEs
(none)
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.