fix CVE-2015-1792 - CMS verify infinite loop with unknown hash function
[1.0.1e-48]
fix CVE-2015-3216 - regression in RAND locking that can cause segfaults on
read in multithreaded applications
[1.0.1e-47]
fix CVE-2015-4000 - prevent the logjam attack on client - restrict
the DH key size to at least 768 bits (limit will be increased in future)
[1.0.1e-46]
drop the AES-GCM restriction of 2^32 operations because the IV is
always 96 bits (32 bit fixed field + 64 bit invocation field)
[1.0.1e-45]
update fix for CVE-2015-0287 to what was released upstream
[1.0.1e-44]
fix CVE-2015-0209 - potential use after free in d2i_ECPrivateKey()
fix CVE-2015-0286 - improper handling of ASN.1 boolean comparison
fix CVE-2015-0289 - NULL dereference decoding invalid PKCS#7 data
fix CVE-2015-0292 - integer underflow in base64 decoder
fix CVE-2015-0293 - triggerable assert in SSLv2 server
[1.0.1e-43]
fix broken error detection when unwrapping unpadded key
[1.0.1e-42.1]
fix the RFC 5649 for key material that does not need padding
[1.0.1e-42]
test in the non-FIPS RSA keygen for minimal distance of p and q
similarly to the FIPS RSA keygen
[1.0.1e-41]
fix CVE-2014-3570 - incorrect computation in BN_sqr()
fix CVE-2014-3571 - possible crash in dtls1_get_record()
fix CVE-2014-3572 - possible downgrade of ECDH ciphersuite to non-PFS state
fix CVE-2014-8275 - various certificate fingerprint issues
fix CVE-2015-0204 - remove support for RSA ephemeral keys for non-export
ciphersuites and on server
fix CVE-2015-0205 - do not allow unauthenticated client DH certificate
fix CVE-2015-0206 - possible memory leak when buffering DTLS records
[1.0.1e-40]
use FIPS approved method for computation of d in RSA
copy digest algorithm when handling SNI context switch
[1.0.1e-39]
fix CVE-2014-3567 - memory leak when handling session tickets
fix CVE-2014-3513 - memory leak in srtp support
add support for fallback SCSV to partially mitigate CVE-2014-3566
(padding attack on SSL3)
[1.0.1e-38]
do FIPS algorithm selftest before the integrity check
[1.0.1e-37]
add support for RFC 5649 (#1119738)
do not pass the FIPS integrity check if the .hmac files are empty (#1128849)
add ECC TLS extensions to DTLS (#1119803)
do not send ECC ciphersuites in SSLv2 client hello (#1090955)
properly propagate encryption failure in BIO_f_cipher (#1072439)
fix CVE-2014-0224 fix that broke EAP-FAST session resumption support
improve documentation of ciphersuites - patch by Hubert Kario (#1108026)
use case insensitive comparison for servername in s_server (#1081163)
add support for automatic ECDH curve selection on server (#1080128)
FIPS mode: make the limitations on DSA, DH, and RSA keygen
length enforced only if OPENSSL_ENFORCE_MODULUS_BITS environment
variable is set
[1.0.1e-36]
add support for ppc64le architecture
add Power 8 optimalizations
[1.0.1e-35]
fix CVE-2014-3505 - doublefree in DTLS packet processing
fix CVE-2014-3506 - avoid memory exhaustion in DTLS
fix CVE-2014-3507 - avoid memory leak in DTLS
fix CVE-2014-3508 - fix OID handling to avoid information leak
fix CVE-2014-3509 - fix race condition when parsing server hello
fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS
fix CVE-2014-3511 - disallow protocol downgrade via fragmentation
[1.0.1e-34.3]
fix CVE-2010-5298 - possible use of memory after free
fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment
fix CVE-2014-0198 - possible NULL pointer dereference
fix CVE-2014-0221 - DoS from invalid DTLS handshake packet
fix CVE-2014-0224 - SSL/TLS MITM vulnerability
fix CVE-2014-3470 - client-side DoS when using anonymous ECDH
[1.0.1e-34]
fix CVE-2014-0160 - information disclosure in TLS heartbeat extension
[1.0.1e-33]
use the key length from configuration file if req -newkey rsa is invoked
[1.0.1e-32]
avoid unnecessary reseeding in BN_rand in the FIPS mode
[1.0.1e-31]
print ephemeral key size negotiated in TLS handshake (#1057715)
add DH_compute_key_padded needed for FIPS CAVS testing
make expiration and key length changeable by DAYS and KEYLEN
variables in the certificate Makefile (#1058108)
change default hash to sha256 (#1062325)
lower the actual 3des strength so it is sorted behind aes128 (#1056616)
[1:1.0.1e-30]
Mass rebuild 2014-01-24
[1.0.1e-29]
rebuild with -O3 on ppc64 architecture
[1.0.1e-28]
fix CVE-2013-4353 - Invalid TLS handshake crash
fix CVE-2013-6450 - possible MiTM attack on DTLS1
[1:1.0.1e-27]
Mass rebuild 2013-12-27
[1.0.1e-26]
fix CVE-2013-6449 - crash when version in SSL structure is incorrect
drop weak ciphers from the default TLS ciphersuite list
add back some symbols that were dropped with update to 1.0.1 branch
more FIPS validation requirement changes
[1.0.1e-25]
fix locking and reseeding problems with FIPS drbg
[1.0.1e-24]
additional changes required for FIPS validation
disable verification of certificate, CRL, and OCSP signatures
using MD5 if OPENSSL_ENABLE_MD5_VERIFY environment variable
is not set
[1.0.1e-23]
add back support for secp521r1 EC curve
add aarch64 to Configure (#969692)
[1.0.1e-22]
do not advertise ECC curves we do not support (#1022493)
[1.0.1e-21]
make DTLS1 work in FIPS mode
avoid RSA and DSA 512 bits and Whirlpool in ‘openssl speed’ in FIPS mode
drop the -fips subpackage, installation of dracut-fips marks that the FIPS
module is installed
add -x931 parameter to openssl genrsa command to use the ANSI X9.31
key generation method
use FIPS-186-3 method for DSA parameter generation
add OPENSSL_FIPS_NON_APPROVED_MD5_ALLOW environment variable
to allow using MD5 when the system is in the maintenance state
even if the /proc fips flag is on
make openssl pkcs12 command work by default in the FIPS mode
[1.0.0c-2]
listen on ipv6 wildcard in s_server so we accept connections
from both ipv4 and ipv6 (#601612)
fix openssl speed command so it can be used in the FIPS mode
with FIPS allowed ciphers
[1.0.0c-1]
new upstream version fixing CVE-2010-4180
[1.0.0b-3]
replace the revert for the s390x bignum asm routines with
fix from upstream
[1.0.0b-2]
revert upstream change in s390x bignum asm routines
[1.0.0b-1]
new upstream version fixing CVE-2010-3864 (#649304)
[1.0.0a-3]
make SHLIB_VERSION reflect the library suffix
[1.0.0a-2]
openssl man page fix (#609484)
[1.0.0a-1]
new upstream patch release, fixes CVE-2010-0742 (#598738)
and CVE-2010-1633 (#598732)
[1.0.0-5]
pkgconfig files now contain the correct libdir (#593723)
[1.0.0-4]
make CA dir readable - the private keys are in private subdir (#584810)
[1.0.0-3]
a few fixes from upstream CVS
move libcrypto to /lib (#559953)
[1.0.0-2]
set UTC timezone on pod2man run (#578842)
make X509_NAME_hash_old work in FIPS mode
[1.0.0-1]
update to final 1.0.0 upstream release
[1.0.0-0.22.beta5]
make TLS work in the FIPS mode
[1.0.0-0.21.beta5]
gracefully handle zero length in assembler implementations of
OPENSSL_cleanse (#564029)
do not fail in s_server if client hostname not resolvable (#561260)
[1.0.0-0.20.beta5]
new upstream release
[1.0.0-0.19.beta4]
fix CVE-2009-4355 - leak in applications incorrectly calling
CRYPTO_free_all_ex_data() before application exit (#546707)
upstream fix for future TLS protocol version handling
[1.0.0-0.18.beta4]
add support for Intel AES-NI
[1.0.0-0.17.beta4]
upstream fix compression handling on session resumption
various null checks and other small fixes from upstream
upstream changes for the renegotiation info according to the latest draft
[1.0.0-0.16.beta4]
fix non-fips mingw build (patch by Kalev Lember)
add IPV6 fix for DTLS
[1.0.0-0.15.beta4]
add better error reporting for the unsafe renegotiation
[1.0.0-0.14.beta4]
fix build on s390x
[1.0.0-0.13.beta4]
disable enforcement of the renegotiation extension on the client (#537962)
add fixes from the current upstream snapshot
[1.0.0-0.12.beta4]
keep the beta status in version number at 3 so we do not have to rebuild
openssh and possibly other dependencies with too strict version check
[1.0.0-0.11.beta4]
update to new upstream version, no soname bump needed
fix CVE-2009-3555 - note that the fix is bypassed if SSL_OP_ALL is used
so the compatibility with unfixed clients is not broken. The
protocol extension is also not final.
[1.0.0-0.10.beta3]
fix use of freed memory if SSL_CTX_free() is called before
SSL_free() (#521342)
[1.0.0-0.9.beta3]
fix typo in DTLS1 code (#527015)
fix leak in error handling of d2i_SSL_SESSION()
[1.0.0-0.8.beta3]
Fix link line for libssl (bug #111154).
[0.9.7a-25]
add dependency on zlib-devel for the -devel package, which depends on zlib
symbols because we enable zlib for libssl (#102962)
[0.9.7a-24]
Use /dev/urandom instead of PRNG for libica.
Apply libica-1.3.5 fix for /dev/urandom in icalinux.c
Use latest ICA engine patch from IBM.
[0.9.7a-22.1]
rebuild
[0.9.7a-22]
rebuild (22 wasn’t actually built, fun eh?)
[0.9.7a-23]
re-disable optimizations on ppc64
Tue Sep 30 2003 Joe Orton
add a_mbstr.c fix for 64-bit platforms from CVS
[0.9.7a-22]
add -Wa,–noexecstack to RPM_OPT_FLAGS so that assembled modules get tagged
as not needing executable stacks
[0.9.7a-21]
rebuild
Thu Sep 25 2003 Nalin Dahyabhai
re-enable optimizations on ppc64
Thu Sep 25 2003 Nalin Dahyabhai
remove exclusivearch
[0.9.7a-20]
only parse a client cert if one was requested
temporarily exclusivearch for %{ix86}
Tue Sep 23 2003 Nalin Dahyabhai
add security fixes for protocol parsing bugs (CAN-2003-0543, CAN-2003-0544)
and heap corruption (CAN-2003-0545)
update RHNS-CA-CERT files
ease back on the number of threads used in the threading test
[0.9.7a-19]
rebuild to fix gzipped file md5sums (#91211)
[0.9.7a-18]
Updated libica to version 1.3.4.
[0.9.7a-17]
rebuild
[0.9.7a-10.9]
free the kssl_ctx structure when we free an SSL structure (#99066)
[0.9.7a-16]
rebuild
[0.9.7a-15]
lower thread test count on s390x
[0.9.7a-14]
rebuild
[0.9.7a-13]
disable assembly on arches where it seems to conflict with threading
[0.9.7a-12]
Updated libica to latest upstream version 1.3.0
[0.9.7a-9.9]
rebuild
[0.9.7a-11]
rebuild
[0.9.7a-10]
ubsec: don’t stomp on output data which might also be input data
[0.9.7a-9]
temporarily disable optimizations on ppc64
Mon Jun 09 2003 Nalin Dahyabhai
backport fix for engine-used-for-everything from 0.9.7b
backport fix for prng not being seeded causing problems, also from 0.9.7b
add a check at build-time to ensure that RSA is thread-safe
keep perlpath from stomping on the libica configure scripts
Fri Jun 06 2003 Nalin Dahyabhai
thread-safety fix for RSA blinding
[0.9.7a-8]
rebuilt
[0.9.7a-7]
Added libica-1.2 to openssl (featurerequest).
[0.9.7a-6]
fix building with incorrect flags on ppc64
[0.9.7a-5]
add patch to harden against Klima-Pokorny-Rosa extension of Bleichenbacher’s
attack (CAN-2003-0131)
[ 0.9.7a-4]
add patch to enable RSA blinding by default, closing a timing attack
(CAN-2003-0147)
[0.9.7a-3]
disable use of BN assembly module on x86_64, but continue to allow inline
assembly (#83403)
[0.9.7a-2]
disable EC algorithms
[0.9.7a-1]
update to 0.9.7a
[0.9.7-8]
add fix to guard against attempts to allocate negative amounts of memory
add patch for CAN-2003-0078, fixing a timing attack
[0.9.7-7]
Add openssl-ppc64.patch
[0.9.7-6]
EVP_DecryptInit should call EVP_CipherInit() instead of EVP_CipherInit_ex(),
to get the right behavior when passed uninitialized context structures
(#83766)
build with -mcpu=ev5 on alpha family (#83828)
Wed Jan 22 2003 Tim Powers
rebuilt
[0.9.7-4]
Added IBM hw crypto support patch.
Wed Jan 15 2003 Nalin Dahyabhai
add missing builddep on sed
[0.9.7-3]
debloat
fix broken manpage symlinks
[0.9.7-2]
fix double-free in ‘openssl ca’
[0.9.7-1]
update to 0.9.7 final
[0.9.7-0]
update to 0.9.7 beta6 (DO NOT USE UNTIL UPDATED TO FINAL 0.9.7)
Wed Dec 11 2002 Nalin Dahyabhai
update to 0.9.7 beta5 (DO NOT USE UNTIL UPDATED TO FINAL 0.9.7)
[0.9.6b-30]
add configuration stanza for x86_64 and use it on x86_64
build for linux-ppc on ppc
start running the self-tests again
[0.9.6b-29hammer.3]
Merge fixes from previous hammer packages, including general x86-64 and
multilib
[0.9.6b-29]
rebuild
[0.9.6b-28]
update asn patch to fix accidental reversal of a logic check
[0.9.6b-27]
update asn patch to reduce chance that compiler optimization will remove
one of the added tests
[0.9.6b-26]
rebuild
[0.9.6b-25]
add patch to fix ASN.1 vulnerabilities
[0.9.6b-24]
add backport of Ben Laurie’s patches for OpenSSL 0.9.6d
[0.9.6b-23]
own {_datadir}/ssl/misc
Fri Jun 21 2002 Tim Powers
automated rebuild
Sun May 26 2002 Tim Powers
automated rebuild
[0.9.6b-20]
free ride through the build system (whee!)
[0.9.6b-19]
rebuild in new environment
[0.9.6b-17, 0.9.6b-18]
merge RHL-specific bits into stronghold package, rename
[stronghold-0.9.6c-2]
add support for Chrysalis Luna token
Tue Mar 26 2002 Gary Benson
disable AEP random number generation, other AEP fixes
[0.9.6b-15]
only build subpackages on primary arches
[0.9.6b-13]
on ia32, only disable use of assembler on i386
enable assembly on ia64
[0.9.6b-11]
fix sparcv9 entry
[stronghold-0.9.6c-1]
upgrade to 0.9.6c
bump BuildArch to i686 and enable assembler on all platforms
synchronise with shrimpy and rawhide
bump soversion to 3
Wed Oct 10 2001 Florian La Roche
delete BN_LLONG for s390x, patch from Oliver Paukstadt
[0.9.6b-9]
update AEP driver patch
Mon Sep 10 2001 Nalin Dahyabhai
adjust RNG disabling patch to match version of patch from Broadcom
[0.9.6b-8]
disable the RNG in the ubsec engine driver
[0.9.6b-7]
tweaks to the ubsec engine driver
[0.9.6b-6]
tweaks to the ubsec engine driver
[0.9.6b-5]
update ubsec engine driver from Broadcom
[0.9.6b-4]
move man pages back to %{_mandir}/man?/foo.?ssl from
%{_mandir}/man?ssl/foo.?
add an [ engine ] section to the default configuration file
Thu Aug 09 2001 Nalin Dahyabhai
add a patch for selecting a default engine in SSL_library_init()
[0.9.6b-3]
add patches for AEP hardware support
add patch to keep trying when we fail to load a cert from a file and
there are more in the file
add missing prototype for ENGINE_ubsec() in engine_int.h
[0.9.6b-2]
actually add hw_ubsec to the engine list
Tue Jul 17 2001 Nalin Dahyabhai
add in the hw_ubsec driver from CVS
[0.9.6b-1]
update to 0.9.6b
Thu Jul 05 2001 Nalin Dahyabhai
move .so symlinks back to %{_libdir}
Tue Jul 03 2001 Nalin Dahyabhai
move shared libraries to /lib (#38410)
Mon Jun 25 2001 Nalin Dahyabhai
switch to engine code base
Mon Jun 18 2001 Nalin Dahyabhai
add a script for creating dummy certificates
move man pages from %{_mandir}/man?/foo.?ssl to %{_mandir}/man?ssl/foo.?
Thu Jun 07 2001 Florian La Roche
add s390x support
Fri Jun 01 2001 Nalin Dahyabhai
change two memcpy() calls to memmove()
don’t define L_ENDIAN on alpha
[stronghold-0.9.6a-1]
Add ‘stronghold-’ prefix to package names.
Obsolete standard openssl packages.
Wed May 16 2001 Joe Orton
Add BuildArch: i586 as per Nalin’s advice.
Tue May 15 2001 Joe Orton
Enable assembler on ix86 (using new .tar.bz2 which does
include the asm directories).
Tue May 15 2001 Nalin Dahyabhai
make subpackages depend on the main package
Tue May 01 2001 Nalin Dahyabhai
adjust the hobble script to not disturb symlinks in include/ (fix from
Joe Orton)
Fri Apr 27 2001 Nalin Dahyabhai
drop the m2crypo patch we weren’t using
Tue Apr 24 2001 Nalin Dahyabhai
configure using ‘shared’ as well
Sun Apr 08 2001 Nalin Dahyabhai
update to 0.9.6a
use the build-shared target to build shared libraries
bump the soversion to 2 because we’re no longer compatible with
our 0.9.5a packages or our 0.9.6 packages
drop the patch for making rsatest a no-op when rsa null support is used
put all man pages into
ssl instead of
break the m2crypto modules into a separate package
Tue Mar 13 2001 Nalin Dahyabhai
use BN_LLONG on s390
Mon Mar 12 2001 Nalin Dahyabhai
fix the s390 changes for 0.9.6 (isn’t supposed to be marked as 64-bit)
Sat Mar 03 2001 Nalin Dahyabhai
move c_rehash to the perl subpackage, because it’s a perl script now
bump the soversion to 1 because we’re no longer compatible with any of
the various 0.9.5a packages circulating around, which provide lib*.so.0
Wed Feb 28 2001 Florian La Roche
change hobble-openssl for disabling MD2 again
Tue Feb 27 2001 Nalin Dahyabhai
re-disable MD2 – the EVP_MD_CTX structure would grow from 100 to 152
bytes or so, causing EVP_DigestInit() to zero out stack variables in
apps built against a version of the library without it
Mon Feb 26 2001 Nalin Dahyabhai
disable some inline assembly, which on x86 is Pentium-specific