Jump to letter: [
ABCDFGHIJKLMNOPQRSTUVWXY
]
openssl11 - Utilities from the general purpose cryptography library with TLS implementation
- Description:
The OpenSSL toolkit provides support for secure communications between
machines. OpenSSL includes a certificate management tool and shared
libraries which provide various cryptographic algorithms and
protocols.
Packages
openssl11-1.1.1k-12.el8_9.an2.src
[7.4 MiB] |
Changelog
by JoungKyun.Kim (2024-01-15):
- only change revision to 12.el8_9 from 12.el8_6
|
openssl11-1.1.1k-7.el8_6.an2.src
[7.3 MiB] |
Changelog
by Clemens Lang (2022-07-05):
- Fix CVE-2022-2097: AES OCB fails to encrypt some bytes on 32-bit x86
Resolves: CVE-2022-2097
- Update expired certificates used in the testsuite
Resolves: rhbz#2100554
- Fix CVE-2022-1292: openssl: c_rehash script allows command injection
Resolves: rhbz#2090371
- Fix CVE-2022-2068: the c_rehash script allows command injection
Resolves: rhbz#2098278
|
openssl11-1.1.1k-5.el8_5.an3.src
[7.3 MiB] |
Changelog
by JoungKyun.Kim (2021-12-30):
- security issues
. CVE-2021-3712 openssl: Read buffer overruns processing ASN.1 strings
|
openssl11-1.1.1g-15.el8_3.an3.0.1.src
[7.2 MiB] |
Changelog
by JoungKyun.Kim (2021-09-10):
- security issues
. CVE-2021-3711 Fixed an SM2 Decryption Buffer Overflow
https://access.redhat.com/security/cve/cve-2021-3711
. CVE-2021-3712 Fixed various read buffer overruns processing ASN.1 strings
https://access.redhat.com/security/cve/cve-2021-3712
|
openssl11-1.1.1g-15.el8_3.an2.src
[7.2 MiB] |
Changelog
by JoungKyun.Kim (2021-03-25):
- security issues
. CVE-2021-3449 NULL pointer deref in signature_algorithms processing
. CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT
|
openssl11-1.1.1g-12.el8_3.an3.src
[7.2 MiB] |
Changelog
by Sahana Prasad (2020-12-04):
- Fix CVE-2020-1971 ediparty null pointer dereference
|
openssl11-1.1.1c-15.el8.an3.src
[6.4 MiB] |
Changelog
by Tomáš Mráz (2020-03-05):
- add selftest of the RAND_DRBG implementation
|