The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack.
rhn.redhat.com/errata/RHSA-2012-0426.html
rhn.redhat.com/errata/RHSA-2012-0488.html
rhn.redhat.com/errata/RHSA-2012-0531.html
rhn.redhat.com/errata/RHSA-2012-1306.html
rhn.redhat.com/errata/RHSA-2012-1307.html
rhn.redhat.com/errata/RHSA-2012-1308.html
secunia.com/advisories/48580
secunia.com/advisories/48895
secunia.com/advisories/48916
secunia.com/advisories/57353
www-01.ibm.com/support/docview.wss?uid=ssg1S1004564
www.debian.org/security/2012/dsa-2454
www.kb.cert.org/vuls/id/737740
downloads.avaya.com/css/P8/documents/100162507
hermes.opensuse.org/messages/14330767
lists.fedoraproject.org/pipermail/package-announce/2012-April/077086.html
lists.fedoraproject.org/pipermail/package-announce/2012-April/077221.html
lists.fedoraproject.org/pipermail/package-announce/2012-April/077666.html
lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html
marc.info/?l=bugtraq&m=133728068926468&w=2
marc.info/?l=bugtraq&m=133951357207000&w=2
marc.info/?l=bugtraq&m=134039053214295&w=2
www.openssl.org/news/secadv_20120312.txt