openssl11-devel-1.1.1k-12.el8_9.an3.x86_64
[295 KiB] |
Changelog
by JoungKyun.Kim (2024-01-15):
- only change revision to 12.el8_9 from 12.el8_6
|
openssl11-devel-1.1.1k-9.el8_6.an3.x86_64
[294 KiB] |
Changelog
by Dmitry Belyavskiy (2023-02-08):
- Fixed Timing Oracle in RSA Decryption
Resolves: CVE-2022-4304
- Fixed Double free after calling PEM_read_bio_ex
Resolves: CVE-2022-4450
- Fixed Use-after-free following BIO_new_NDEF
Resolves: CVE-2023-0215
- Fixed X.400 address type confusion in X.509 GeneralName
Resolves: CVE-2023-0286
|
openssl11-devel-1.1.1k-7.el8_6.an3.x86_64
[294 KiB] |
Changelog
by Clemens Lang (2022-07-05):
- Fix CVE-2022-2097: AES OCB fails to encrypt some bytes on 32-bit x86
Resolves: CVE-2022-2097
- Update expired certificates used in the testsuite
Resolves: rhbz#2100554
- Fix CVE-2022-1292: openssl: c_rehash script allows command injection
Resolves: rhbz#2090371
- Fix CVE-2022-2068: the c_rehash script allows command injection
Resolves: rhbz#2098278
|
openssl11-devel-1.1.1k-5.el8_5.an3.0.1.x86_64
[293 KiB] |
Changelog
by JoungKyun.Kim (2022-02-05):
- support compatible with EPEL openssl11 package
- fixed wrong soft link .libcrypto.11.so.1.1.1k.hmac
|
openssl11-devel-1.1.1k-5.el8_5.an3.x86_64
[293 KiB] |
Changelog
by JoungKyun.Kim (2021-12-30):
- security issues
. CVE-2021-3712 openssl: Read buffer overruns processing ASN.1 strings
|
openssl11-devel-1.1.1g-15.el8_3.an3.0.1.x86_64
[292 KiB] |
Changelog
by JoungKyun.Kim (2021-09-10):
- security issues
. CVE-2021-3711 Fixed an SM2 Decryption Buffer Overflow
https://access.redhat.com/security/cve/cve-2021-3711
. CVE-2021-3712 Fixed various read buffer overruns processing ASN.1 strings
https://access.redhat.com/security/cve/cve-2021-3712
|
openssl11-devel-1.1.1g-15.el8_3.an3.x86_64
[291 KiB] |
Changelog
by JoungKyun.Kim (2021-03-25):
- security issues
. CVE-2021-3449 NULL pointer deref in signature_algorithms processing
. CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT
|
openssl11-devel-1.1.1g-12.el8_3.an3.x86_64
[291 KiB] |
Changelog
by Sahana Prasad (2020-12-04):
- Fix CVE-2020-1971 ediparty null pointer dereference
|
openssl11-devel-1.1.1g-11.el8.an3.x86_64
[291 KiB] |
Changelog
by Tomáš Mráz (2020-07-20):
- Further changes for SP 800-56A rev3 requirements
|
openssl11-devel-1.1.1c-15.el8.an3.x86_64
[289 KiB] |
Changelog
by Tomáš Mráz (2020-03-05):
- add selftest of the RAND_DRBG implementation
|
openssl11-devel-1.1.1c-2.el8.an3.1.x86_64
[288 KiB] |
Changelog
by Tomáš Mráz (2020-03-05):
- add selftest of the RAND_DRBG implementation
- fix incorrect error return value from FIPS_selftest_dsa
|
openssl11-devel-1.1.1c-2.el8.an3.x86_64
[288 KiB] |
Changelog
by oungKyun.Kim (2019-11-14):
- security issue
. CVE-2018-0734 timing side channel attack in the DSA signature algorithm
. CVE-2018-0735 timing side channel attack in the ECDSA signature generation
. CVE-2019-1543 ChaCha20-Poly1305 with long nonces
|
openssl11-devel-1.1.1b-10.fc31.an3.x86_64
[456 KiB] |
Changelog
by JoungKyun.Kim (2019-05-19):
- build 1.1 compat package for AnNyung 3
|
openssl11-devel-1.1.1-8.el8.an3.x86_64
[285 KiB] |
Changelog
by JoungKyun.Kim (2019-05-19):
- build 1.1 compat package for AnNyung 3
|