logo
DATABASE RESOURCES PRICING ABOUT US

openssl security update

Description

[1.0.2k-16.0.1.el7_6.1] - Bump release for rebuild. [1.0.2k-16.1] - use SHA-256 in FIPS RSA pairwise key check - fix CVE-2018-5407 - EC signature local timing side-channel key extraction [1.0.2k-16] - fix CVE-2018-0495 - ROHNP - Key Extraction Side Channel on DSA, ECDSA - fix incorrect error message on FIPS DSA parameter generation (#1603597) [1.0.2k-14] - ppc64le is not multilib architecture (#1585004) [1.0.2k-13] - add S390x assembler updates - make CA name list comparison function case sensitive (#1548401) - fix CVE-2017-3735 - possible one byte overread with X.509 IPAdressFamily - fix CVE-2018-0732 - large prime DH DoS of TLS client - fix CVE-2018-0737 - RSA key generation cache timing vulnerability - fix CVE-2018-0739 - stack overflow parsing recursive ASN.1 structure [1.0.2k-12] - fix CVE-2017-3737 - incorrect handling of fatal error state - fix CVE-2017-3738 - AVX2 Montgomery multiplication bug with 1024 bit modulus [1.0.2k-11] - fix deadlock in RNG in the FIPS mode in mariadb [1.0.2k-9] - fix CVE-2017-3736 - carry propagation bug in Montgomery multiplication [1.0.2k-8] - fix regression in openssl req -x509 command (#1450015) [1.0.2k-7] - handle incorrect size gracefully in aes_p8_cbc_encrypt() [1.0.2k-6] - allow long client hellos to be received by server [1.0.2k-5] - fix CPU features detection on new AMD processors [1.0.2k-4] - add support for additional STARTTLS protocols to s_client original backported patch by Robert Scheck (#1396209) [1.0.2k-3] - properly document the SSLv2 support removal [1.0.2k-2] - add PPC assembler updates [1.0.2k-1] - minor upstream release 1.0.2k fixing security issues [1.0.2j-2] - deprecate and disable verification of insecure hash algorithms - add support for /etc/pki/tls/legacy-settings also for minimum DH length accepted by SSL client - compare the encrypt and tweak key in XTS as required by FIPS [1.0.2j-1] - rebase to latest upstream release from the 1.0.2 branch, ABI compatible [1.0.1e-60] - fix CVE-2016-2177 - possible integer overflow - fix CVE-2016-2178 - non-constant time DSA operations - fix CVE-2016-2179 - further DoS issues in DTLS - fix CVE-2016-2180 - OOB read in TS_OBJ_print_bio() - fix CVE-2016-2181 - DTLS1 replay protection and unprocessed records issue - fix CVE-2016-2182 - possible buffer overflow in BN_bn2dec() - fix CVE-2016-6302 - insufficient TLS session ticket HMAC length check - fix CVE-2016-6304 - unbound memory growth with OCSP status request - fix CVE-2016-6306 - certificate message OOB reads - mitigate CVE-2016-2183 - degrade all 64bit block ciphers and RC4 to 112 bit effective strength [1.0.1e-58] - replace expired testing certificates [1.0.1e-57] - fix CVE-2016-2105 - possible overflow in base64 encoding - fix CVE-2016-2106 - possible overflow in EVP_EncryptUpdate() - fix CVE-2016-2107 - padding oracle in stitched AES-NI CBC-MAC - fix CVE-2016-2108 - memory corruption in ASN.1 encoder - fix CVE-2016-2109 - possible DoS when reading ASN.1 data from BIO [1.0.1e-56] - fix 1-byte memory leak in pkcs12 parse (#1312112) - document some options of the speed command (#1312110) - fix high-precision timestamps in timestamping authority - enable SCTP support in DTLS - use correct digest when exporting keying material in TLS1.2 (#1289620) - fix CVE-2016-0799 - memory issues in BIO_printf - add support for setting Kerberos service and keytab in s_server and s_client [1.0.1e-55] - fix CVE-2016-0702 - side channel attack on modular exponentiation - fix CVE-2016-0705 - double-free in DSA private key parsing - fix CVE-2016-0797 - heap corruption in BN_hex2bn and BN_dec2bn [1.0.1e-54] - fix CVE-2015-3197 - SSLv2 ciphersuite enforcement - disable SSLv2 in the generic TLS method [1.0.1e-53] - fix CVE-2015-7575 - disallow use of MD5 in TLS1.2 [1.0.1e-52] - fix CVE-2015-3194 - certificate verify crash with missing PSS parameter - fix CVE-2015-3195 - X509_ATTRIBUTE memory leak - fix CVE-2015-3196 - race condition when handling PSK identity hint [1.0.1e-51] - fix the CVE-2015-1791 fix (broken server side renegotiation) [1.0.1e-50] - improved fix for CVE-2015-1791 - add missing parts of CVE-2015-0209 fix for corectness although unexploitable [1.0.1e-49] - fix CVE-2014-8176 - invalid free in DTLS buffering code - fix CVE-2015-1789 - out-of-bounds read in X509_cmp_time - fix CVE-2015-1790 - PKCS7 crash with missing EncryptedContent - fix CVE-2015-1791 - race condition handling NewSessionTicket - fix CVE-2015-1792 - CMS verify infinite loop with unknown hash function [1.0.1e-48] - fix CVE-2015-3216 - regression in RAND locking that can cause segfaults on read in multithreaded applications [1.0.1e-47] - fix CVE-2015-4000 - prevent the logjam attack on client - restrict the DH key size to at least 768 bits (limit will be increased in future) [1.0.1e-46] - drop the AES-GCM restriction of 2^32 operations because the IV is always 96 bits (32 bit fixed field + 64 bit invocation field) [1.0.1e-45] - update fix for CVE-2015-0287 to what was released upstream [1.0.1e-44] - fix CVE-2015-0209 - potential use after free in d2i_ECPrivateKey() - fix CVE-2015-0286 - improper handling of ASN.1 boolean comparison - fix CVE-2015-0287 - ASN.1 structure reuse decoding memory corruption - fix CVE-2015-0288 - X509_to_X509_REQ NULL pointer dereference - fix CVE-2015-0289 - NULL dereference decoding invalid PKCS#7 data - fix CVE-2015-0292 - integer underflow in base64 decoder - fix CVE-2015-0293 - triggerable assert in SSLv2 server [1.0.1e-43] - fix broken error detection when unwrapping unpadded key [1.0.1e-42.1] - fix the RFC 5649 for key material that does not need padding [1.0.1e-42] - test in the non-FIPS RSA keygen for minimal distance of p and q similarly to the FIPS RSA keygen [1.0.1e-41] - fix CVE-2014-3570 - incorrect computation in BN_sqr() - fix CVE-2014-3571 - possible crash in dtls1_get_record() - fix CVE-2014-3572 - possible downgrade of ECDH ciphersuite to non-PFS state - fix CVE-2014-8275 - various certificate fingerprint issues - fix CVE-2015-0204 - remove support for RSA ephemeral keys for non-export ciphersuites and on server - fix CVE-2015-0205 - do not allow unauthenticated client DH certificate - fix CVE-2015-0206 - possible memory leak when buffering DTLS records [1.0.1e-40] - use FIPS approved method for computation of d in RSA - copy digest algorithm when handling SNI context switch [1.0.1e-39] - fix CVE-2014-3567 - memory leak when handling session tickets - fix CVE-2014-3513 - memory leak in srtp support - add support for fallback SCSV to partially mitigate CVE-2014-3566 (padding attack on SSL3) [1.0.1e-38] - do FIPS algorithm selftest before the integrity check [1.0.1e-37] - add support for RFC 5649 (#1119738) - do not pass the FIPS integrity check if the .hmac files are empty (#1128849) - add ECC TLS extensions to DTLS (#1119803) - do not send ECC ciphersuites in SSLv2 client hello (#1090955) - properly propagate encryption failure in BIO_f_cipher (#1072439) - fix CVE-2014-0224 fix that broke EAP-FAST session resumption support - improve documentation of ciphersuites - patch by Hubert Kario (#1108026) - use case insensitive comparison for servername in s_server (#1081163) - add support for automatic ECDH curve selection on server (#1080128) - FIPS mode: make the limitations on DSA, DH, and RSA keygen length enforced only if OPENSSL_ENFORCE_MODULUS_BITS environment variable is set [1.0.1e-36] - add support for ppc64le architecture - add Power 8 optimalizations [1.0.1e-35] - fix CVE-2014-3505 - doublefree in DTLS packet processing - fix CVE-2014-3506 - avoid memory exhaustion in DTLS - fix CVE-2014-3507 - avoid memory leak in DTLS - fix CVE-2014-3508 - fix OID handling to avoid information leak - fix CVE-2014-3509 - fix race condition when parsing server hello - fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS - fix CVE-2014-3511 - disallow protocol downgrade via fragmentation [1.0.1e-34.3] - fix CVE-2010-5298 - possible use of memory after free - fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment - fix CVE-2014-0198 - possible NULL pointer dereference - fix CVE-2014-0221 - DoS from invalid DTLS handshake packet - fix CVE-2014-0224 - SSL/TLS MITM vulnerability - fix CVE-2014-3470 - client-side DoS when using anonymous ECDH [1.0.1e-34] - fix CVE-2014-0160 - information disclosure in TLS heartbeat extension [1.0.1e-33] - use the key length from configuration file if req -newkey rsa is invoked [1.0.1e-32] - avoid unnecessary reseeding in BN_rand in the FIPS mode [1.0.1e-31] - print ephemeral key size negotiated in TLS handshake (#1057715) - add DH_compute_key_padded needed for FIPS CAVS testing - make expiration and key length changeable by DAYS and KEYLEN variables in the certificate Makefile (#1058108) - change default hash to sha256 (#1062325) - lower the actual 3des strength so it is sorted behind aes128 (#1056616) [1:1.0.1e-30] - Mass rebuild 2014-01-24 [1.0.1e-29] - rebuild with -O3 on ppc64 architecture [1.0.1e-28] - fix CVE-2013-4353 - Invalid TLS handshake crash - fix CVE-2013-6450 - possible MiTM attack on DTLS1 [1:1.0.1e-27] - Mass rebuild 2013-12-27 [1.0.1e-26] - fix CVE-2013-6449 - crash when version in SSL structure is incorrect - drop weak ciphers from the default TLS ciphersuite list - add back some symbols that were dropped with update to 1.0.1 branch - more FIPS validation requirement changes [1.0.1e-25] - fix locking and reseeding problems with FIPS drbg [1.0.1e-24] - additional changes required for FIPS validation - disable verification of certificate, CRL, and OCSP signatures using MD5 if OPENSSL_ENABLE_MD5_VERIFY environment variable is not set [1.0.1e-23] - add back support for secp521r1 EC curve - add aarch64 to Configure (#969692) [1.0.1e-22] - do not advertise ECC curves we do not support (#1022493) [1.0.1e-21] - make DTLS1 work in FIPS mode - avoid RSA and DSA 512 bits and Whirlpool in 'openssl speed' in FIPS mode - drop the -fips subpackage, installation of dracut-fips marks that the FIPS module is installed - avoid dlopening libssl.so from libcrypto - fix small memory leak in FIPS aes selftest - fix segfault in openssl speed hmac in the FIPS mode [1.0.1e-20] - document the nextprotoneg option in manual pages original patch by Hubert Kario - try to avoid some races when updating the -fips subpackage [1.0.1e-19] - use version-release in .hmac suffix to avoid overwrite during upgrade [1.0.1e-18] - always perform the FIPS selftests in library constructor if FIPS module is installed [1.0.1e-16] - add -fips subpackage that contains the FIPS module files [1.0.1e-15] - fix use of rdrand if available - more commits cherry picked from upstream - documentation fixes [1.0.1e-14] - additional manual page fix - use symbol versioning also for the textual version [1.0.1e-13] - additional manual page fixes - cleanup speed command output for ECDH ECDSA [1.0.1e-12] - use _prefix macro [1.0.1e-11] - add openssl.cnf.5 manpage symlink to config.5 [1.0.1e-10] - add relro linking flag [1.0.1e-9] - add support for the -trusted_first option for certificate chain verification [1.0.1e-8] - disable GOST engine [1.0.1e-7] - add symbol version for ECC functions [1.0.1e-6] - update the FIPS selftests to use 256 bit curves [1.0.1e-5] - enabled NIST Suite B ECC curves and algorithms [1.0.1e-4] - fix random bad record mac errors (#918981) [1.0.1e-3] - fix up the SHLIB_VERSION_NUMBER [1.0.1e-2] - disable ZLIB loading by default (due to CRIME attack) [1.0.1e-1] - new upstream version [1.0.1c-12] - more fixes from upstream - fix errors in manual causing build failure (#904777) [1.0.1c-11] - add script for renewal of a self-signed cert by Philip Prindeville (#871566) - allow X509_issuer_and_serial_hash() produce correct result in the FIPS mode (#881336) [1.0.1c-10] - do not load default verify paths if CApath or CAfile specified (#884305) [1.0.1c-9] - more fixes from upstream CVS - fix DSA key pairwise check (#878597) [1.0.1c-8] - use 1024 bit DH parameters in s_server as 512 bit is not allowed in FIPS mode and it is quite weak anyway [1.0.1c-7] - add missing initialization of str in aes_ccm_init_key (#853963) - add important patches from upstream CVS - use the secure_getenv() with new glibc [1:1.0.1c-6] - Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild [1.0.1c-5] - use __getenv_secure() instead of __libc_enable_secure [1.0.1c-4] - do not move libcrypto to /lib - do not use environment variables if __libc_enable_secure is on - fix strict aliasing problems in modes [1.0.1c-3] - fix DSA key generation in FIPS mode (#833866) - allow duplicate FIPS_mode_set(1) - enable build on ppc64 subarch (#834652) [1.0.1c-2] - fix s_server with new glibc when no global IPv6 address (#839031) - make it build with new Perl [1.0.1c-1] - new upstream version [1.0.1b-1] - new upstream version [1.0.1a-1] - new upstream version fixing CVE-2012-2110 [1.0.1-3] - add Kerberos 5 libraries to pkgconfig for static linking (#807050) [1.0.1-2] - backports from upstream CVS - fix segfault when /dev/urandom is not available (#809586) [1.0.1-1] - new upstream release [1.0.1-0.3.beta3] - add obsoletes to assist multilib updates (#799636) [1.0.1-0.2.beta3] - epoch bumped to 1 due to revert to 1.0.0g on Fedora 17 - new upstream release from the 1.0.1 branch - fix s390x build (#798411) - versioning for the SSLeay symbol (#794950) - add -DPURIFY to build flags (#797323) - filter engine provides - split the libraries to a separate -libs package - add make to requires on the base package (#783446) [1.0.1-0.1.beta2] - new upstream release from the 1.0.1 branch, ABI compatible - add documentation for the -no_ign_eof option [1.0.0g-1] - new upstream release fixing CVE-2012-0050 - DoS regression in DTLS support introduced by the previous release (#782795) [1.0.0f-1] - new upstream release fixing multiple CVEs [1.0.0e-4] - move the libraries needed for static linking to Libs.private [1.0.0e-3] - do not use AVX instructions when osxsave bit not set - add direct known answer tests for SHA2 algorithms [1.0.0e-2] - fix missing initialization of variable in CHIL engine [1.0.0e-1] - new upstream release fixing CVE-2011-3207 (#736088) [1.0.0d-8] - drop the separate engine for Intel acceleration improvements and merge in the AES-NI, SHA1, and RC4 optimizations - add support for OPENSSL_DISABLE_AES_NI environment variable that disables the AES-NI support [1.0.0d-7] - correct openssl cms help output (#636266) - more tolerant starttls detection in XMPP protocol (#608239) [1.0.0d-6] - add support for newest Intel acceleration improvements backported from upstream by Intel in form of a separate engine [1.0.0d-5] - allow the AES-NI engine in the FIPS mode [1.0.0d-4] - add API necessary for CAVS testing of the new DSA parameter generation [1.0.0d-3] - add support for VIA Padlock on 64bit arch from upstream (#617539) - do not return bogus values from load_certs (#652286) [1.0.0d-2] - clarify apps help texts for available digest algorithms (#693858) [1.0.0d-1] - new upstream release fixing CVE-2011-0014 (OCSP stapling vulnerability) [1.0.0c-4] - Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild [1.0.0c-3] - add -x931 parameter to openssl genrsa command to use the ANSI X9.31 key generation method - use FIPS-186-3 method for DSA parameter generation - add OPENSSL_FIPS_NON_APPROVED_MD5_ALLOW environment variable to allow using MD5 when the system is in the maintenance state even if the /proc fips flag is on - make openssl pkcs12 command work by default in the FIPS mode [1.0.0c-2] - listen on ipv6 wildcard in s_server so we accept connections from both ipv4 and ipv6 (#601612) - fix openssl speed command so it can be used in the FIPS mode with FIPS allowed ciphers [1.0.0c-1] - new upstream version fixing CVE-2010-4180 [1.0.0b-3] - replace the revert for the s390x bignum asm routines with fix from upstream [1.0.0b-2] - revert upstream change in s390x bignum asm routines [1.0.0b-1] - new upstream version fixing CVE-2010-3864 (#649304) [1.0.0a-3] - make SHLIB_VERSION reflect the library suffix [1.0.0a-2] - openssl man page fix (#609484) [1.0.0a-1] - new upstream patch release, fixes CVE-2010-0742 (#598738) and CVE-2010-1633 (#598732) [1.0.0-5] - pkgconfig files now contain the correct libdir (#593723) [1.0.0-4] - make CA dir readable - the private keys are in private subdir (#584810) [1.0.0-3] - a few fixes from upstream CVS - move libcrypto to /lib (#559953) [1.0.0-2] - set UTC timezone on pod2man run (#578842) - make X509_NAME_hash_old work in FIPS mode [1.0.0-1] - update to final 1.0.0 upstream release [1.0.0-0.22.beta5] - make TLS work in the FIPS mode [1.0.0-0.21.beta5] - gracefully handle zero length in assembler implementations of OPENSSL_cleanse (#564029) - do not fail in s_server if client hostname not resolvable (#561260) [1.0.0-0.20.beta5] - new upstream release [1.0.0-0.19.beta4] - fix CVE-2009-4355 - leak in applications incorrectly calling CRYPTO_free_all_ex_data() before application exit (#546707) - upstream fix for future TLS protocol version handling [1.0.0-0.18.beta4] - add support for Intel AES-NI [1.0.0-0.17.beta4] - upstream fix compression handling on session resumption - various null checks and other small fixes from upstream - upstream changes for the renegotiation info according to the latest draft [1.0.0-0.16.beta4] - fix non-fips mingw build (patch by Kalev Lember) - add IPV6 fix for DTLS [1.0.0-0.15.beta4] - add better error reporting for the unsafe renegotiation [1.0.0-0.14.beta4] - fix build on s390x [1.0.0-0.13.beta4] - disable enforcement of the renegotiation extension on the client (#537962) - add fixes from the current upstream snapshot [1.0.0-0.12.beta4] - keep the beta status in version number at 3 so we do not have to rebuild openssh and possibly other dependencies with too strict version check [1.0.0-0.11.beta4] - update to new upstream version, no soname bump needed - fix CVE-2009-3555 - note that the fix is bypassed if SSL_OP_ALL is used so the compatibility with unfixed clients is not broken. The protocol extension is also not final. [1.0.0-0.10.beta3] - fix use of freed memory if SSL_CTX_free() is called before SSL_free() (#521342) [1.0.0-0.9.beta3] - fix typo in DTLS1 code (#527015) - fix leak in error handling of d2i_SSL_SESSION() [1.0.0-0.8.beta3] - fix RSA and DSA FIPS selftests - reenable fixed x86_64 camellia assembler code (#521127) [1.0.0-0.7.beta3] - temporarily disable x86_64 camellia assembler code (#521127) [1.0.0-0.6.beta3] - fix openssl dgst -dss1 (#520152) [1.0.0-0.5.beta3] - drop the compat symlink hacks [1.0.0-0.4.beta3] - constify SSL_CIPHER_description() [1.0.0-0.3.beta3] - fix WWW:Curl:Easy reference in tsget [1.0.0-0.2.beta3] - enable MD-2 [1.0.0-0.1.beta3] - update to new major upstream release [0.9.8k-7] - Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild * Wed Jul 22 2009 Bill Nottingham - do not build special 'optimized' versions for i686, as that's the base arch in Fedora now [0.9.8k-6] - abort if selftests failed and random number generator is polled - mention EVP_aes and EVP_sha2xx routines in the manpages - add README.FIPS - make CA dir absolute path (#445344) - change default length for RSA key generation to 2048 (#484101) [0.9.8k-5] - fix CVE-2009-1377 CVE-2009-1378 CVE-2009-1379 (DTLS DoS problems) (#501253, #501254, #501572) [0.9.8k-4] - support compatibility DTLS mode for CISCO AnyConnect (#464629) [0.9.8k-3] - correct the SHLIB_VERSION define [0.9.8k-2] - add support for multiple CRLs with same subject - load only dynamic engine support in FIPS mode [0.9.8k-1] - update to new upstream release (minor bug fixes, security fixes and machine code optimizations only) [0.9.8j-10] - move libraries to /usr/lib (#239375) [0.9.8j-9] - add a static subpackage [0.9.8j-8] - Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild [0.9.8j-7] - must also verify checksum of libssl.so in the FIPS mode - obtain the seed for FIPS rng directly from the kernel device - drop the temporary symlinks [0.9.8j-6] - drop the temporary triggerpostun and symlinking in post - fix the pkgconfig files and drop the unnecessary buildrequires on pkgconfig as it is a rpmbuild dependency (#481419) [0.9.8j-5] - add temporary triggerpostun to reinstate the symlinks [0.9.8j-4] - no pairwise key tests in non-fips mode (#479817) [0.9.8j-3] - even more robust test for the temporary symlinks [0.9.8j-2] - try to ensure the temporary symlinks exist [0.9.8j-1] - new upstream version with necessary soname bump (#455753) - temporarily provide symlink to old soname to make it possible to rebuild the dependent packages in rawhide - add eap-fast support (#428181) - add possibility to disable zlib by setting - add fips mode support for testing purposes - do not null dereference on some invalid smime files - add buildrequires pkgconfig (#479493) [0.9.8g-11] - do not add tls extensions to server hello for SSLv3 either [0.9.8g-10] - move root CA bundle to ca-certificates package [0.9.8g-9] - fix CVE-2008-0891 - server name extension crash (#448492) - fix CVE-2008-1672 - server key exchange message omit crash (#448495) [0.9.8g-8] - super-H arch support - drop workaround for bug 199604 as it should be fixed in gcc-4.3 [0.9.8g-7] - sparc handling [0.9.8g-6] - update to new root CA bundle from mozilla.org (r1.45) [0.9.8g-5] - Autorebuild for GCC 4.3 [0.9.8g-4] - merge review fixes (#226220) - adjust the SHLIB_VERSION_NUMBER to reflect library name (#429846) [0.9.8g-3] - set default paths when no explicit paths are set (#418771) - do not add tls extensions to client hello for SSLv3 (#422081) [0.9.8g-2] - enable some new crypto algorithms and features - add some more important bug fixes from openssl CVS [0.9.8g-1] - update to latest upstream release, SONAME bumped to 7 [0.9.8b-17] - update to new CA bundle from mozilla.org [0.9.8b-16] - fix CVE-2007-5135 - off-by-one in SSL_get_shared_ciphers (#309801) - fix CVE-2007-4995 - out of order DTLS fragments buffer overflow (#321191) - add alpha sub-archs (#296031) [0.9.8b-15] - rebuild [0.9.8b-14] - use localhost in testsuite, hopefully fixes slow build in koji - CVE-2007-3108 - fix side channel attack on private keys (#250577) - make ssl session cache id matching strict (#233599) [0.9.8b-13] - allow building on ARM architectures (#245417) - use reference timestamps to prevent multilib conflicts (#218064) - -devel package must require pkgconfig (#241031) [0.9.8b-12] - detect duplicates in add_dir properly (#206346) [0.9.8b-11] - the previous change still didn't make X509_NAME_cmp transitive [0.9.8b-10] - make X509_NAME_cmp transitive otherwise certificate lookup is broken (#216050) [0.9.8b-9] - aliasing bug in engine loading, patch by IBM (#213216) [0.9.8b-8] - CVE-2006-2940 fix was incorrect (#208744) [0.9.8b-7] - fix CVE-2006-2937 - mishandled error on ASN.1 parsing (#207276) - fix CVE-2006-2940 - parasitic public keys DoS (#207274) - fix CVE-2006-3738 - buffer overflow in SSL_get_shared_ciphers (#206940) - fix CVE-2006-4343 - sslv2 client DoS (#206940) [0.9.8b-6] - fix CVE-2006-4339 - prevent attack on PKCS#1 v1.5 signatures (#205180) [0.9.8b-5] - set buffering to none on stdio/stdout FILE when bufsize is set (#200580) patch by IBM [0.9.8b-4.1] - rebuild with new binutils (#200330) [0.9.8b-4] - add a temporary workaround for sha512 test failure on s390 (#199604) * Thu Jul 20 2006 Tomas Mraz - add ipv6 support to s_client and s_server (by Jan Pazdziora) (#198737) - add patches for BN threadsafety, AES cache collision attack hazard fix and pkcs7 code memleak fix from upstream CVS [0.9.8b-3.1] - rebuild [0.9.8b-3] - dropped libica and ica engine from build * Wed Jun 21 2006 Joe Orton - update to new CA bundle from mozilla.org; adds CA certificates from netlock.hu and startcom.org [0.9.8b-2] - fixed a few rpmlint warnings - better fix for #173399 from upstream - upstream fix for pkcs12 [0.9.8b-1] - upgrade to new version, stays ABI compatible - there is no more linux/config.h (it was empty anyway) [0.9.8a-6] - fix stale open handles in libica (#177155) - fix build if 'rand' or 'passwd' in buildroot path (#178782) - initialize VIA Padlock engine (#186857) [0.9.8a-5.2] - bump again for double-long bug on ppc(64) [0.9.8a-5.1] - rebuilt for new gcc4.1 snapshot and glibc changes [0.9.8a-5] - don't include SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG in SSL_OP_ALL (#175779) * Fri Dec 09 2005 Jesse Keating - rebuilt [0.9.8a-4] - fix build (-lcrypto was erroneusly dropped) of the updated libica - updated ICA engine to 1.3.6-rc3 [0.9.8a-3] - disable builtin compression methods for now until they work properly (#173399) [0.9.8a-2] - don't set -rpath for openssl binary [0.9.8a-1] - new upstream version - patches partially renumbered [0.9.7f-11] - updated IBM ICA engine library and patch to latest upstream version [0.9.7f-10] - fix CAN-2005-2969 - remove SSL_OP_MSIE_SSLV2_RSA_PADDING which disables the countermeasure against man in the middle attack in SSLv2 (#169863) - use sha1 as default for CA and cert requests - CAN-2005-2946 (#169803) [0.9.7f-9] - add *.so.soversion as symlinks in /lib (#165264) - remove unpackaged symlinks (#159595) - fixes from upstream (constant time fixes for DSA, bn assembler div on ppc arch, initialize memory on realloc) [0.9.7f-8] - Updated ICA engine IBM patch to latest upstream version. [0.9.7f-7] - fix CAN-2005-0109 - use constant time/memory access mod_exp so bits of private key aren't leaked by cache eviction (#157631) - a few more fixes from upstream 0.9.7g [0.9.7f-6] - use poll instead of select in rand (#128285) - fix Makefile.certificate to point to /etc/pki/tls - change the default string mask in ASN1 to PrintableString+UTF8String [0.9.7f-5] - update to revision 1.37 of Mozilla CA bundle [0.9.7f-4] - move certificates to _sysconfdir/pki/tls (#143392) - move CA directories to _sysconfdir/pki/CA - patch the CA script and the default config so it points to the CA directories [0.9.7f-3] - uninitialized variable mustn't be used as input in inline assembly - reenable the x86_64 assembly again [0.9.7f-2] - add back RC4_CHAR on ia64 and x86_64 so the ABI isn't broken - disable broken bignum assembly on x86_64 [0.9.7f-1] - reenable optimizations on ppc64 and assembly code on ia64 - upgrade to new upstream version (no soname bump needed) - disable thread test - it was testing the backport of the RSA blinding - no longer needed - added support for changing serial number to Makefile.certificate (#151188) - make ca-bundle.crt a config file (#118903) [0.9.7e-3] - libcrypto shouldn't depend on libkrb5 (#135961) [0.9.7e-2] - rebuild [0.9.7e-1] - new upstream source, updated patches - added patch so we are hopefully ABI compatible with upcoming 0.9.7f * Thu Feb 10 2005 Tomas Mraz - Support UTF-8 charset in the Makefile.certificate (#134944) - Added cmp to BuildPrereq [0.9.7a-46] - generate new ca-bundle.crt from Mozilla certdata.txt (revision 1.32) [0.9.7a-45] - Fixed and updated libica-1.3.4-urandom.patch patch (#122967) [0.9.7a-44] - rebuild [0.9.7a-43] - rebuild [0.9.7a-42] - rebuild [0.9.7a-41] - remove der_chop, as upstream cvs has done (CAN-2004-0975, #140040) [0.9.7a-40] - Include latest libica version with important bugfixes * Tue Jun 15 2004 Elliot Lee - rebuilt [0.9.7a-38] - Updated ICA engine IBM patch to latest upstream version. [0.9.7a-37] - build for linux-alpha-gcc instead of alpha-gcc on alpha (Jeff Garzik) [0.9.7a-36] - handle %{_arch}=i486/i586/i686/athlon cases in the intermediate header (#124303) [0.9.7a-35] - add security fixes for CAN-2004-0079, CAN-2004-0112 * Tue Mar 16 2004 Phil Knirsch - Fixed libica filespec. [0.9.7a-34] - ppc/ppc64 define __powerpc__/__powerpc64__, not __ppc__/__ppc64__, fix the intermediate header [0.9.7a-33] - add an intermediate which points to the right arch-specific opensslconf.h on multilib arches * Tue Mar 02 2004 Elliot Lee - rebuilt [0.9.7a-32] - Updated libica to latest upstream version 1.3.5. [0.9.7a-31] - Update ICA crypto engine patch from IBM to latest version. * Fri Feb 13 2004 Elliot Lee - rebuilt [0.9.7a-29] - rebuilt [0.9.7a-28] - Fixed libica build. * Wed Feb 04 2004 Nalin Dahyabhai - add '-ldl' to link flags added for Linux-on-ARM (#99313) [0.9.7a-27] - updated ca-bundle.crt: removed expired GeoTrust roots, added freessl.com root, removed trustcenter.de Class 0 root [0.9.7a-26] - Fix link line for libssl (bug #111154). [0.9.7a-25] - add dependency on zlib-devel for the -devel package, which depends on zlib symbols because we enable zlib for libssl (#102962) [0.9.7a-24] - Use /dev/urandom instead of PRNG for libica. - Apply libica-1.3.5 fix for /dev/urandom in icalinux.c - Use latest ICA engine patch from IBM. [0.9.7a-22.1] - rebuild [0.9.7a-22] - rebuild (22 wasn't actually built, fun eh?) [0.9.7a-23] - re-disable optimizations on ppc64 * Tue Sep 30 2003 Joe Orton - add a_mbstr.c fix for 64-bit platforms from CVS [0.9.7a-22] - add -Wa,--noexecstack to RPM_OPT_FLAGS so that assembled modules get tagged as not needing executable stacks [0.9.7a-21] - rebuild * Thu Sep 25 2003 Nalin Dahyabhai - re-enable optimizations on ppc64 * Thu Sep 25 2003 Nalin Dahyabhai - remove exclusivearch [0.9.7a-20] - only parse a client cert if one was requested - temporarily exclusivearch for %{ix86} * Tue Sep 23 2003 Nalin Dahyabhai - add security fixes for protocol parsing bugs (CAN-2003-0543, CAN-2003-0544) and heap corruption (CAN-2003-0545) - update RHNS-CA-CERT files - ease back on the number of threads used in the threading test [0.9.7a-19] - rebuild to fix gzipped file md5sums (#91211) [0.9.7a-18] - Updated libica to version 1.3.4. [0.9.7a-17] - rebuild [0.9.7a-10.9] - free the kssl_ctx structure when we free an SSL structure (#99066) [0.9.7a-16] - rebuild [0.9.7a-15] - lower thread test count on s390x [0.9.7a-14] - rebuild [0.9.7a-13] - disable assembly on arches where it seems to conflict with threading [0.9.7a-12] - Updated libica to latest upstream version 1.3.0 [0.9.7a-9.9] - rebuild [0.9.7a-11] - rebuild [0.9.7a-10] - ubsec: don't stomp on output data which might also be input data [0.9.7a-9] - temporarily disable optimizations on ppc64 * Mon Jun 09 2003 Nalin Dahyabhai - backport fix for engine-used-for-everything from 0.9.7b - backport fix for prng not being seeded causing problems, also from 0.9.7b - add a check at build-time to ensure that RSA is thread-safe - keep perlpath from stomping on the libica configure scripts * Fri Jun 06 2003 Nalin Dahyabhai - thread-safety fix for RSA blinding [0.9.7a-8] - rebuilt [0.9.7a-7] - Added libica-1.2 to openssl (featurerequest). [0.9.7a-6] - fix building with incorrect flags on ppc64 [0.9.7a-5] - add patch to harden against Klima-Pokorny-Rosa extension of Bleichenbacher's attack (CAN-2003-0131) [ 0.9.7a-4] - add patch to enable RSA blinding by default, closing a timing attack (CAN-2003-0147) [0.9.7a-3] - disable use of BN assembly module on x86_64, but continue to allow inline assembly (#83403) [0.9.7a-2] - disable EC algorithms [0.9.7a-1] - update to 0.9.7a [0.9.7-8] - add fix to guard against attempts to allocate negative amounts of memory - add patch for CAN-2003-0078, fixing a timing attack [0.9.7-7] - Add openssl-ppc64.patch [0.9.7-6] - EVP_DecryptInit should call EVP_CipherInit() instead of EVP_CipherInit_ex(), to get the right behavior when passed uninitialized context structures (#83766) - build with -mcpu=ev5 on alpha family (#83828) * Wed Jan 22 2003 Tim Powers - rebuilt [0.9.7-4] - Added IBM hw crypto support patch. * Wed Jan 15 2003 Nalin Dahyabhai - add missing builddep on sed [0.9.7-3] - debloat - fix broken manpage symlinks [0.9.7-2] - fix double-free in 'openssl ca' [0.9.7-1] - update to 0.9.7 final [0.9.7-0] - update to 0.9.7 beta6 (DO NOT USE UNTIL UPDATED TO FINAL 0.9.7) * Wed Dec 11 2002 Nalin Dahyabhai - update to 0.9.7 beta5 (DO NOT USE UNTIL UPDATED TO FINAL 0.9.7) [0.9.6b-30] - add configuration stanza for x86_64 and use it on x86_64 - build for linux-ppc on ppc - start running the self-tests again [0.9.6b-29hammer.3] - Merge fixes from previous hammer packages, including general x86-64 and multilib [0.9.6b-29] - rebuild [0.9.6b-28] - update asn patch to fix accidental reversal of a logic check [0.9.6b-27] - update asn patch to reduce chance that compiler optimization will remove one of the added tests [0.9.6b-26] - rebuild [0.9.6b-25] - add patch to fix ASN.1 vulnerabilities [0.9.6b-24] - add backport of Ben Laurie's patches for OpenSSL 0.9.6d [0.9.6b-23] - own {_datadir}/ssl/misc * Fri Jun 21 2002 Tim Powers - automated rebuild * Sun May 26 2002 Tim Powers - automated rebuild [0.9.6b-20] - free ride through the build system (whee!) [0.9.6b-19] - rebuild in new environment [0.9.6b-17, 0.9.6b-18] - merge RHL-specific bits into stronghold package, rename [stronghold-0.9.6c-2] - add support for Chrysalis Luna token * Tue Mar 26 2002 Gary Benson - disable AEP random number generation, other AEP fixes [0.9.6b-15] - only build subpackages on primary arches [0.9.6b-13] - on ia32, only disable use of assembler on i386 - enable assembly on ia64 [0.9.6b-11] - fix sparcv9 entry [stronghold-0.9.6c-1] - upgrade to 0.9.6c - bump BuildArch to i686 and enable assembler on all platforms - synchronise with shrimpy and rawhide - bump soversion to 3 * Wed Oct 10 2001 Florian La Roche - delete BN_LLONG for s390x, patch from Oliver Paukstadt [0.9.6b-9] - update AEP driver patch * Mon Sep 10 2001 Nalin Dahyabhai - adjust RNG disabling patch to match version of patch from Broadcom [0.9.6b-8] - disable the RNG in the ubsec engine driver [0.9.6b-7] - tweaks to the ubsec engine driver [0.9.6b-6] - tweaks to the ubsec engine driver [0.9.6b-5] - update ubsec engine driver from Broadcom [0.9.6b-4] - move man pages back to %{_mandir}/man?/foo.?ssl from %{_mandir}/man?ssl/foo.? - add an [ engine ] section to the default configuration file * Thu Aug 09 2001 Nalin Dahyabhai - add a patch for selecting a default engine in SSL_library_init() [0.9.6b-3] - add patches for AEP hardware support - add patch to keep trying when we fail to load a cert from a file and there are more in the file - add missing prototype for ENGINE_ubsec() in engine_int.h [0.9.6b-2] - actually add hw_ubsec to the engine list * Tue Jul 17 2001 Nalin Dahyabhai - add in the hw_ubsec driver from CVS [0.9.6b-1] - update to 0.9.6b * Thu Jul 05 2001 Nalin Dahyabhai - move .so symlinks back to %{_libdir} * Tue Jul 03 2001 Nalin Dahyabhai - move shared libraries to /lib (#38410) * Mon Jun 25 2001 Nalin Dahyabhai - switch to engine code base * Mon Jun 18 2001 Nalin Dahyabhai - add a script for creating dummy certificates - move man pages from %{_mandir}/man?/foo.?ssl to %{_mandir}/man?ssl/foo.? * Thu Jun 07 2001 Florian La Roche - add s390x support * Fri Jun 01 2001 Nalin Dahyabhai - change two memcpy() calls to memmove() - don't define L_ENDIAN on alpha [stronghold-0.9.6a-1] - Add 'stronghold-' prefix to package names. - Obsolete standard openssl packages. * Wed May 16 2001 Joe Orton - Add BuildArch: i586 as per Nalin's advice. * Tue May 15 2001 Joe Orton - Enable assembler on ix86 (using new .tar.bz2 which does include the asm directories). * Tue May 15 2001 Nalin Dahyabhai - make subpackages depend on the main package * Tue May 01 2001 Nalin Dahyabhai - adjust the hobble script to not disturb symlinks in include/ (fix from Joe Orton) * Fri Apr 27 2001 Nalin Dahyabhai - drop the m2crypo patch we weren't using * Tue Apr 24 2001 Nalin Dahyabhai - configure using 'shared' as well * Sun Apr 08 2001 Nalin Dahyabhai - update to 0.9.6a - use the build-shared target to build shared libraries - bump the soversion to 2 because we're no longer compatible with our 0.9.5a packages or our 0.9.6 packages - drop the patch for making rsatest a no-op when rsa null support is used - put all man pages into ssl instead of - break the m2crypto modules into a separate package * Tue Mar 13 2001 Nalin Dahyabhai - use BN_LLONG on s390 * Mon Mar 12 2001 Nalin Dahyabhai - fix the s390 changes for 0.9.6 (isn't supposed to be marked as 64-bit) * Sat Mar 03 2001 Nalin Dahyabhai - move c_rehash to the perl subpackage, because it's a perl script now * Fri Mar 02 2001 Nalin Dahyabhai - update to 0.9.6 - enable MD2 - use the libcrypto.so and libssl.so targets to build shared libs with - bump the soversion to 1 because we're no longer compatible with any of the various 0.9.5a packages circulating around, which provide lib*.so.0 * Wed Feb 28 2001 Florian La Roche - change hobble-openssl for disabling MD2 again * Tue Feb 27 2001 Nalin Dahyabhai - re-disable MD2 -- the EVP_MD_CTX structure would grow from 100 to 152 bytes or so, causing EVP_DigestInit() to zero out stack variables in apps built against a version of the library without it * Mon Feb 26 2001 Nalin Dahyabhai - disable some inline assembly, which on x86 is Pentium-specific - re-enable MD2 (see http://www.ietf.org/ietf/IPR/RSA-MD-all) * Thu Feb 08 2001 Florian La Roche - fix s390 patch * Fri Dec 08 2000 Than Ngo - added support s390 * Mon Nov 20 2000 Nalin Dahyabhai - remove -Wa,* and -m* compiler flags from the default Configure file (#20656) - add the CA.pl man page to the perl subpackage * Thu Nov 02 2000 Nalin Dahyabhai - always build with -mcpu=ev5 on alpha * Tue Oct 31 2000 Nalin Dahyabhai - add a symlink from cert.pem to ca-bundle.crt * Wed Oct 25 2000 Nalin Dahyabhai - add a ca-bundle file for packages like Samba to reference for CA certificates * Tue Oct 24 2000 Nalin Dahyabhai - remove libcrypto's crypt(), which doesn't handle md5crypt (#19295) * Mon Oct 02 2000 Nalin Dahyabhai - add unzip as a buildprereq (#17662) - update m2crypto to 0.05-snap4 * Tue Sep 26 2000 Bill Nottingham - fix some issues in building when it's not installed * Wed Sep 06 2000 Nalin Dahyabhai - make sure the headers we include are the ones we built with (aaaaarrgh!) * Fri Sep 01 2000 Nalin Dahyabhai - add Richard Henderson's patch for BN on ia64 - clean up the changelog * Tue Aug 29 2000 Nalin Dahyabhai - fix the building of python modules without openssl-devel already installed * Wed Aug 23 2000 Nalin Dahyabhai - byte-compile python extensions without the build-root - adjust the makefile to not remove temporary files (like .key files when building .csr files) by marking them as .PRECIOUS * Sat Aug 19 2000 Nalin Dahyabhai - break out python extensions into a subpackage * Mon Jul 17 2000 Nalin Dahyabhai - tweak the makefile some more * Tue Jul 11 2000 Nalin Dahyabhai - disable MD2 support * Thu Jul 06 2000 Nalin Dahyabhai - disable MDC2 support * Sun Jul 02 2000 Nalin Dahyabhai - tweak the disabling of RC5, IDEA support - tweak the makefile * Thu Jun 29 2000 Nalin Dahyabhai - strip binaries and libraries - rework certificate makefile to have the right parts for Apache * Wed Jun 28 2000 Nalin Dahyabhai - use %{_perl} instead of /usr/bin/perl - disable alpha until it passes its own test suite * Fri Jun 09 2000 Nalin Dahyabhai - move the passwd.1 man page out of the passwd package's way * Fri Jun 02 2000 Nalin Dahyabhai - update to 0.9.5a, modified for U.S. - add perl as a build-time requirement - move certificate makefile to another package - disable RC5, IDEA, RSA support - remove optimizations for now * Wed Mar 01 2000 Florian La Roche - Bero told me to move the Makefile into this package * Wed Mar 01 2000 Florian La Roche - add lib*.so symlinks to link dynamically against shared libs * Tue Feb 29 2000 Florian La Roche - update to 0.9.5 - run ldconfig directly in post/postun - add FAQ * Sat Dec 18 1999 Bernhard Rosenkrdnzer - Fix build on non-x86 platforms * Fri Nov 12 1999 Bernhard Rosenkrdnzer - move /usr/share/ssl/* from -devel to main package * Tue Oct 26 1999 Bernhard Rosenkrdnzer - inital packaging - changes from base: - Move /usr/local/ssl to /usr/share/ssl for FHS compliance - handle RPM_OPT_FLAGS


Affected Package


OS OS Version Package Name Package Version
oracle linux 7 openssl 1.0.2k-16.0.1.ksplice1.el7_6.1
oracle linux 7 openssl 1.0.2k-16.0.1.ksplice1.el7_6.1
oracle linux 7 openssl-devel 1.0.2k-16.0.1.ksplice1.el7_6.1
oracle linux 7 openssl-devel 1.0.2k-16.0.1.ksplice1.el7_6.1
oracle linux 7 openssl-libs 1.0.2k-16.0.1.ksplice1.el7_6.1
oracle linux 7 openssl-libs 1.0.2k-16.0.1.ksplice1.el7_6.1
oracle linux 7 openssl-perl 1.0.2k-16.0.1.ksplice1.el7_6.1
oracle linux 7 openssl-static 1.0.2k-16.0.1.ksplice1.el7_6.1
oracle linux 7 openssl-static 1.0.2k-16.0.1.ksplice1.el7_6.1

Related