[ All 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Project openssl-1:1.1.1k-12.el8_9

Name openssl
Epoch 1
Version 1.1.1k
Release 12.el8_9
Website/URL http://www.openssl.org/
License OpenSSL and ASL 2.0
Build Time 2024-03-13 16:33:45
Build Host builder-x86-04.inferitos.ru
Summary Utilities from the general purpose cryptography library with TLS implementation
Repositories BaseOS
Description The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols.
Errata
× Full screenshot
Packages link
Package Summary SHA-256 checksum
x86_64
openssl-1:1.1.1k-12.el8_9.x86_64 Utilities from the general purpose cryptography library with TLS implementation f771a12d7200d78567d26598e7b214548be2ea75a6aa385e45e782cd4abd8c6d download
openssl-devel-1:1.1.1k-12.el8_9.x86_64 Files for development of applications which will use OpenSSL 8088487af6d3be0f481bb6edeb885c8b512ad34c59a7dc172ae7fadee9231390 download
openssl-libs-1:1.1.1k-12.el8_9.x86_64 A general purpose cryptography library with TLS implementation 987375bddc486988eaec2d6ef3f61111ffe9008cbb4bb8f4bb61937288a34a71 download
openssl-perl-1:1.1.1k-12.el8_9.x86_64 Perl scripts provided with OpenSSL 683e0b4a2b100d8c6de24f1a6c5f7511215b0f42b6f82a85506742ebdc46f03d download
i686
openssl-devel-1:1.1.1k-12.el8_9.i686 Files for development of applications which will use OpenSSL eac34492d6c1b986f44393aeee9e9c504b74baaf67fcd36e92647ed75893467e download
openssl-libs-1:1.1.1k-12.el8_9.i686 A general purpose cryptography library with TLS implementation 0eca6c83857360158f9c5166d52a13bae8370871d49e5df3292a8f5541b3cd44 download
src
openssl-1:1.1.1k-12.el8_9.src Utilities from the general purpose cryptography library with TLS implementation fae12c50409de10da75a9fb262766a325923dd77c8b28ef9ecf7245057c7b3de download
Changelog link
* Thu Nov 30 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:1.1.1k-12
- Backport implicit rejection mechanism for RSA PKCS#1 v1.5 to RHEL-8 series
  (a proper fix for CVE-2020-25659)
  Resolves: RHEL-17696

* Wed Nov 15 2023 Clemens Lang <cllang@redhat.com> - 1:1.1.1k-11
- Fix CVE-2023-5678: Generating excessively long X9.42 DH keys or checking
  excessively long X9.42 DH keys or parameters may be very slow
  Resolves: RHEL-16538

* Thu Oct 19 2023 Clemens Lang <cllang@redhat.com> - 1:1.1.1k-10
- Fix CVE-2023-3446: Excessive time spent checking DH keys and parameters
  Resolves: RHEL-14245
- Fix CVE-2023-3817: Excessive time spent checking DH q parameter value
  Resolves: RHEL-14239

* Wed Jul 26 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 1:1.1.1k-9
- Rebuilt for MSVSphere 8.8

* Wed Feb 08 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:1.1.1k-9
- Fixed Timing Oracle in RSA Decryption
  Resolves: CVE-2022-4304
- Fixed Double free after calling PEM_read_bio_ex
  Resolves: CVE-2022-4450
- Fixed Use-after-free following BIO_new_NDEF
  Resolves: CVE-2023-0215
- Fixed X.400 address type confusion in X.509 GeneralName
  Resolves: CVE-2023-0286

* Thu Jul 21 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:1.1.1k-8
- Fix no-ec build
  Resolves: rhbz#2071020

* Tue Jul 05 2022 Clemens Lang <cllang@redhat.com> - 1:1.1.1k-7
- Fix CVE-2022-2097: AES OCB fails to encrypt some bytes on 32-bit x86
  Resolves: CVE-2022-2097
- Update expired certificates used in the testsuite
  Resolves: rhbz#2092462
- Fix CVE-2022-1292: openssl: c_rehash script allows command injection
  Resolves: rhbz#2090372
- Fix CVE-2022-2068: the c_rehash script allows command injection
  Resolves: rhbz#2098279

* Wed Mar 23 2022 Clemens Lang <cllang@redhat.com> - 1:1.1.1k-6
- Fixes CVE-2022-0778 openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
- Resolves: rhbz#2067146

* Tue Nov 16 2021 Sahana Prasad <sahana@redhat.com> - 1:1.1.1k-5
- Fixes CVE-2021-3712 openssl: Read buffer overruns processing ASN.1 strings
- Resolves: rhbz#2005402

* Fri Jul 16 2021 Sahana Prasad <sahana@redhat.com> - 1:1.1.1k-4
- Fixes bugs in s390x AES code.
- Uses the first detected address family if IPv6 is not available
- Reverts the changes in https://github.com/openssl/openssl/pull/13305
  as it introduces a regression if server has a DSA key pair, the handshake fails
  when the protocol is not explicitly set to TLS 1.2. However, if the patch is reverted,
  it has an effect on the "ssl_reject_handshake" feature in nginx. Although, this feature
  will continue to work, TLS 1.3 protocol becomes unavailable/disabled. This is already
  known - https://trac.nginx.org/nginx/ticket/2071#comment:1
  As per https://github.com/openssl/openssl/issues/16075#issuecomment-879939938, nginx
  could early callback instead of servername callback.
- Resolves: rhbz#1978214
- Related: rhbz#1934534