]>
git.pld-linux.org Git - packages/openssl.git/log
Jan Palus [Wed, 6 Dec 2023 11:45:49 +0000 (12:45 +0100)]
upstream duplicate symbols test fix
fixes: https://github.com/openssl/openssl/issues/22837
from: https://github.com/openssl/openssl/pull/22880
Jan Palus [Thu, 23 Nov 2023 15:22:29 +0000 (16:22 +0100)]
up to 3.2.0
Jan Palus [Tue, 24 Oct 2023 21:29:42 +0000 (23:29 +0200)]
make -tools depend on %{?_isa} variant of openssl
Jan Palus [Tue, 24 Oct 2023 14:21:31 +0000 (16:21 +0200)]
up to 3.1.4 (fixes CVE-2023-5363)
Arkadiusz Miśkiewicz [Thu, 5 Oct 2023 17:51:23 +0000 (19:51 +0200)]
Up to 3.1.3 (windows only fixes)
Jan Palus [Tue, 1 Aug 2023 19:08:56 +0000 (21:08 +0200)]
up to 3.1.2 (fixes CVE-2023-3817 CVE-2023-3446 CVE-2023-2975)
Jan Palus [Tue, 30 May 2023 16:04:38 +0000 (18:04 +0200)]
up to 3.1.1 (security fixes)
fixes:
CVE-2023-2650
CVE-2023-1255
CVE-2023-0466
CVE-2023-0465
CVE-2023-0464
Jan Palus [Wed, 24 May 2023 15:30:39 +0000 (17:30 +0200)]
make -devel depend on %{?_isa} variant of openssl
Jan Palus [Tue, 14 Mar 2023 22:48:30 +0000 (23:48 +0100)]
up to 3.1.0
Jan Palus [Tue, 7 Feb 2023 16:16:08 +0000 (17:16 +0100)]
up to 3.0.8 (security fixes)
fixes: CVE-2023-0401 CVE-2023-0286 CVE-2023-0217 CVE-2023-0216
CVE-2023-0215 CVE-2022-4450 CVE-2022-4304 CVE-2022-4203 CVE-2022-3996
Jan Rękorajski [Sun, 6 Nov 2022 11:11:18 +0000 (12:11 +0100)]
Release 2 (by relup.sh)
Jan Palus [Tue, 1 Nov 2022 16:22:14 +0000 (17:22 +0100)]
up to 3.0.7 (fixes CVE-2022-3786 CVE-2022-3602)
Jan Palus [Tue, 11 Oct 2022 16:11:52 +0000 (18:11 +0200)]
up to 3.0.6 (fixes CVE-2022-3358)
Jakub Bogusz [Wed, 5 Oct 2022 14:22:06 +0000 (16:22 +0200)]
- clearer man pages packaging (as base names are too common, ensure specific extension)
- package info(1ossl) page, moved config(5ossl) to base package
Jakub Bogusz [Wed, 5 Oct 2022 04:36:58 +0000 (06:36 +0200)]
- moved library configs to base, avoid circular dependency; release 3
Jakub Bogusz [Sun, 10 Jul 2022 18:36:04 +0000 (20:36 +0200)]
- bumped rpm macros for macros.perl included
Jakub Bogusz [Sun, 10 Jul 2022 14:40:11 +0000 (16:40 +0200)]
- enhanced engines-dir patch to adjust enginesdir in libcrypto.pc file; release 2
Jakub Bogusz [Sun, 10 Jul 2022 13:02:40 +0000 (15:02 +0200)]
- versioned Obsoletes
Jan Palus [Tue, 5 Jul 2022 18:24:57 +0000 (20:24 +0200)]
up to 3.0.5 (fixes CVE-2022-2274 CVE-2022-2097)
Jan Palus [Tue, 21 Jun 2022 16:28:20 +0000 (18:28 +0200)]
up to 3.0.4 (fixes CVE-2022-2068)
Jan Palus [Tue, 3 May 2022 22:24:01 +0000 (00:24 +0200)]
up to 3.0.3 (fixes CVE-2022-1292 CVE-2022-1343 CVE-2022-1434 CVE-2022-1473)
Jan Rękorajski [Tue, 15 Mar 2022 22:33:24 +0000 (23:33 +0100)]
Release 2 (by relup.sh)
Jan Palus [Tue, 15 Mar 2022 22:10:09 +0000 (23:10 +0100)]
keep -j1 for tests
Jan Palus [Tue, 15 Mar 2022 21:57:51 +0000 (22:57 +0100)]
try bringing parallel build back
Arkadiusz Miśkiewicz [Tue, 15 Mar 2022 19:32:25 +0000 (20:32 +0100)]
Up to 3.0.2; SECURITY (remote DOS - infinite loop in client/server - CVE-2022-0778).
Arkadiusz Miśkiewicz [Wed, 2 Feb 2022 16:59:09 +0000 (17:59 +0100)]
Rel 2; fixes https://github.com/openssl/openssl/issues/15465
Jan Palus [Thu, 20 Jan 2022 11:10:25 +0000 (12:10 +0100)]
ktls requires linux-libc-headers >= 4.13
Jan Palus [Wed, 15 Dec 2021 15:34:35 +0000 (16:34 +0100)]
BR: libatomic-devel on selected archs
Jan Palus [Tue, 14 Dec 2021 22:25:16 +0000 (23:25 +0100)]
up to 3.0.1 (fixes CVE-2021-4044)
Jan Rękorajski [Sun, 10 Oct 2021 09:24:13 +0000 (11:24 +0200)]
- enable FIPS provider and Kernel TLS support
- merge engines into main package, there is no reason to keep it separated now
- main package requires tools, the lib (esp. FIPS) is half-useless without config
Jan Rękorajski [Sun, 19 Sep 2021 08:20:34 +0000 (10:20 +0200)]
- up to 3.0.0
- removed obsolete bconds and macros
- simplified files
Jan Palus [Wed, 25 Aug 2021 08:59:16 +0000 (10:59 +0200)]
up to 1.1.1l (fixes CVE-2021-3711 CVE-2021-3712)
Jan Palus [Thu, 25 Mar 2021 17:27:05 +0000 (18:27 +0100)]
up to 1.1.1k (fixes CVE-2021-3449 CVE-2021-3450)
Jan Palus [Wed, 17 Feb 2021 14:05:35 +0000 (15:05 +0100)]
up to 1.1.1j (fixes CVE-2021-23841 CVE-2021-23839 CVE-2021-23840)
Jakub Bogusz [Tue, 8 Dec 2020 18:24:32 +0000 (19:24 +0100)]
- updated md5
Elan Ruusamäe [Tue, 8 Dec 2020 17:32:58 +0000 (19:32 +0200)]
Update to 1.1.1i, (CVE-2020-1971)
EDIPARTYNAME NULL pointer de-reference:
- https://www.openssl.org/news/secadv/
20201208 .txt
Overall release notes:
- https://www.openssl.org/news/openssl-1.1.1-notes.html
Elan Ruusamäe [Tue, 1 Dec 2020 14:04:49 +0000 (16:04 +0200)]
Restore snap bcond from dev-1.1 branch
Jakub Bogusz [Tue, 13 Oct 2020 15:05:44 +0000 (17:05 +0200)]
- updated to 1.1.1h
Mike Frysinger [Thu, 17 Mar 2016 17:41:49 +0000 (13:41 -0400)]
openssl-ssl-certificate.sh: fix test POSIX compatibility
The == operator is not in POSIX and will fail with some shells.
Arkadiusz Miśkiewicz [Tue, 21 Apr 2020 18:59:36 +0000 (20:59 +0200)]
- up to 1.1.1g; fixes CVE-2020-1967
Jan Palus [Sat, 4 Apr 2020 23:29:38 +0000 (01:29 +0200)]
up to 1.1.1f
Jakub Bogusz [Sun, 29 Mar 2020 14:32:42 +0000 (16:32 +0200)]
- removed leftover
Arkadiusz Miśkiewicz [Sun, 29 Mar 2020 13:20:09 +0000 (15:20 +0200)]
- up to 1.1.1e; fixes CVE-2019-1551
Jan Rękorajski [Sat, 25 Jan 2020 15:08:27 +0000 (16:08 +0100)]
- drop obsolete and outdated manual inclusion of rpm macros
Jakub Bogusz [Fri, 27 Sep 2019 16:25:09 +0000 (18:25 +0200)]
- updated to 1.1.1d (fixes CVE-2019-1547 CVE-2019-1549 CVE-2019-1563)
- added no-win32 patch (don't require Win32-specific perl module for unix installs)
- added zlib-fix patch (bugfix from git)
Adam Gołębiowski [Wed, 29 May 2019 12:08:57 +0000 (14:08 +0200)]
- updated to 1.1.1c (solves CVE-2019-1543)
Adam Gołębiowski [Wed, 27 Feb 2019 07:02:51 +0000 (08:02 +0100)]
- updated to 1.1.1b
Adam Gołębiowski [Tue, 20 Nov 2018 16:23:18 +0000 (17:23 +0100)]
- updated to 1.1.1a, solves CVE-2018-0734, CVE-2017-0735
- BR: libsctp-devel
Jakub Bogusz [Thu, 27 Sep 2018 19:43:13 +0000 (21:43 +0200)]
- fix rehash manual issue, disable failing test
Jakub Bogusz [Sat, 15 Sep 2018 20:02:46 +0000 (22:02 +0200)]
- merge fix
Jakub Bogusz [Sat, 15 Sep 2018 19:18:22 +0000 (21:18 +0200)]
Merge branch 'dev-1.1'
Jakub Bogusz [Sat, 15 Sep 2018 18:59:33 +0000 (20:59 +0200)]
- updated support end date
Arkadiusz Miśkiewicz [Fri, 14 Sep 2018 08:47:42 +0000 (10:47 +0200)]
- enable sctp
Arkadiusz Miśkiewicz [Thu, 13 Sep 2018 18:01:00 +0000 (20:01 +0200)]
- seems obsolete
Arkadiusz Miśkiewicz [Thu, 13 Sep 2018 17:55:47 +0000 (19:55 +0200)]
- up to final 1.1.1
Jakub Bogusz [Mon, 20 Aug 2018 20:22:03 +0000 (22:22 +0200)]
- up to 1.1.0i
Elan Ruusamäe [Fri, 17 Aug 2018 20:28:57 +0000 (23:28 +0300)]
up to 1.0.2p
Jakub Bogusz [Sun, 1 Apr 2018 08:29:32 +0000 (10:29 +0200)]
- up to 1.1.0h
- dropped asflag patch, updated way of --noexecstack flag passing (taken from config script)
Elan Ruusamäe [Wed, 28 Mar 2018 20:24:11 +0000 (23:24 +0300)]
up to 1.0.2o
Bartek Szady [Thu, 18 Jan 2018 19:13:52 +0000 (20:13 +0100)]
- tools manuals restored
Elan Ruusamäe [Sat, 9 Dec 2017 11:40:29 +0000 (13:40 +0200)]
up to 1.0.2n [7 Dec 2017]; CVE-2017-3737; CVE-2017-3738
- Read/write after SSL object in error state (CVE-2017-3737)
- rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)
https://www.openssl.org/news/openssl-1.0.2-notes.html
Tomasz Pala [Sun, 3 Dec 2017 08:15:35 +0000 (09:15 +0100)]
use the generic ca-bundle path instead of PLD-specific ca-certificates one
Jakub Bogusz [Sun, 19 Nov 2017 20:27:55 +0000 (21:27 +0100)]
- adjusted man prefix to match upstream (openssl- instead of openssl_)
Jakub Bogusz [Sun, 19 Nov 2017 19:43:29 +0000 (20:43 +0100)]
- up to 1.1.0g
- updated optflags,man-namespace,asflag,ca-certificates patches
- removed outdated alpha-ccc,include,ldflags patches
Jakub Bogusz [Sat, 18 Nov 2017 10:28:55 +0000 (11:28 +0100)]
- package more man1 links
Arkadiusz Miśkiewicz [Mon, 6 Nov 2017 08:33:45 +0000 (09:33 +0100)]
- up to 1.0.2m; fixes CVE-2017-3736
Elan Ruusamäe [Tue, 6 Jun 2017 18:06:33 +0000 (21:06 +0300)]
Merge branch 'dev-1.0.2l'
Elan Ruusamäe [Mon, 22 May 2017 16:46:46 +0000 (19:46 +0300)]
build 1.0.2l snapshot
actual release will be made available on 25th May 2017 between
approximately 1200-1600 UTC.
Note: this is bug-fix only release.
No security defects are addressed in this release.
Arkadiusz Miśkiewicz [Thu, 26 Jan 2017 16:35:09 +0000 (17:35 +0100)]
- up to 1.0.2k; fixes CVE-2017-3731, CVE-2017-3732, CVE-2016-7055
Arkadiusz Miśkiewicz [Mon, 26 Sep 2016 14:01:33 +0000 (16:01 +0200)]
- up to 1.0.2j; fixes CVE-2016-7052
Elan Ruusamäe [Sun, 25 Sep 2016 22:55:45 +0000 (01:55 +0300)]
BR: pkgconfig, zlib-devel
which: no pkg-config in (/bin:/usr/bin:/usr/sbin:/sbin:/usr/X11R6/bin)
zlib-devel -- c_zlib.c:25:19: fatal error: zlib.h: No such file or directory
Elan Ruusamäe [Thu, 15 Sep 2016 18:17:30 +0000 (21:17 +0300)]
use https url
the ftp interface will be taken down
https://mta.openssl.org/pipermail/openssl-announce/2016-September/000075.html
Elan Ruusamäe [Thu, 22 Sep 2016 17:55:42 +0000 (20:55 +0300)]
OpenSSL 1.1.0a [22 Sep 2016]
- OCSP Status Request extension unbounded memory growth (CVE-2016-6304)
- SSL_peek() hang on empty record (CVE-2016-6305)
- Excessive allocation of memory in tls_get_message_header() (CVE-2016-6307)
- Excessive allocation of memory in dtls1_preprocess_fragment() (CVE-2016-6308)
https://www.openssl.org/news/openssl-1.1.0-notes.html
Elan Ruusamäe [Thu, 22 Sep 2016 17:58:56 +0000 (20:58 +0300)]
OpenSSL 1.0.2i [22 Sep 2016]; SWEET32 mitigation and typical CVE fixes
- OCSP Status Request extension unbounded memory growth (CVE-2016-6304)
- SWEET32 Mitigation (CVE-2016-2183)
- OOB write in MDC2_Update() (CVE-2016-6303)
- Malformed SHA512 ticket DoS (CVE-2016-6302)
- OOB write in BN_bn2dec() (CVE-2016-2182)
- OOB read in TS_OBJ_print_bio() (CVE-2016-2180)
- Pointer arithmetic undefined behaviour (CVE-2016-2177)
- Constant time flag not preserved in DSA signing (CVE-2016-2178)
- DTLS buffered message DoS (CVE-2016-2179)
- DTLS replay protection DoS (CVE-2016-2181)
- Certificate message OOB reads (CVE-2016-6306)
https://www.openssl.org/news/openssl-1.0.2-notes.html
Elan Ruusamäe [Mon, 19 Sep 2016 15:39:34 +0000 (18:39 +0300)]
up to 1.1.0a-snap
The OpenSSL project team would like to announce the forthcoming
release of OpenSSL versions 1.1.0a, 1.0.2i, 1.0.1u.
These releases will be made available on 22nd September 2016 at
approximately 0800 UTC. They will fix several security defects: one
classfied as severity "high", one as "moderate", and the rest "low".
https://mta.openssl.org/pipermail/openssl-announce/2016-September/000076.html
Elan Ruusamäe [Mon, 19 Sep 2016 15:26:28 +0000 (18:26 +0300)]
up to 1.0.2i-snap
The OpenSSL project team would like to announce the forthcoming
release of OpenSSL versions 1.1.0a, 1.0.2i, 1.0.1u.
These releases will be made available on 22nd September 2016 at
approximately 0800 UTC. They will fix several security defects: one
classfied as severity "high", one as "moderate", and the rest "low".
https://mta.openssl.org/pipermail/openssl-announce/2016-September/000076.html
Elan Ruusamäe [Thu, 15 Sep 2016 18:17:30 +0000 (21:17 +0300)]
use https url
the ftp interface will be taken down
https://mta.openssl.org/pipermail/openssl-announce/2016-September/000075.html
Elan Ruusamäe [Thu, 25 Aug 2016 19:44:00 +0000 (22:44 +0300)]
up to 1.1.0-release
Elan Ruusamäe [Sun, 7 Aug 2016 11:45:55 +0000 (14:45 +0300)]
BR pkgconfig; drop bc
Elan Ruusamäe [Sat, 6 Aug 2016 08:52:52 +0000 (11:52 +0300)]
updated install and files
dozens of man pages unpackaged
Elan Ruusamäe [Sat, 6 Aug 2016 00:24:18 +0000 (03:24 +0300)]
BR zlib-devel
Elan Ruusamäe [Fri, 5 Aug 2016 23:22:08 +0000 (02:22 +0300)]
no more rehash make target
Elan Ruusamäe [Fri, 5 Aug 2016 23:20:28 +0000 (02:20 +0300)]
add --prefix and install engines to /lib
Elan Ruusamäe [Fri, 5 Aug 2016 22:56:50 +0000 (01:56 +0300)]
fix version check
Elan Ruusamäe [Fri, 5 Aug 2016 22:54:59 +0000 (01:54 +0300)]
drop unsupported Configure options
enable-camelia not present already in 1.0.2
Elan Ruusamäe [Fri, 5 Aug 2016 22:27:34 +0000 (01:27 +0300)]
Configure requires Perl 5.10.0;
Elan Ruusamäe [Fri, 5 Aug 2016 20:28:20 +0000 (23:28 +0300)]
up to 1.1.0-pre6
build system renewed, most of the patches do not apply and configure
args are unknown
Elan Ruusamäe [Tue, 3 May 2016 17:11:33 +0000 (20:11 +0300)]
up to OpenSSL 1.0.2h [3 May 2016]
- Prevent padding oracle in AES-NI CBC MAC check (CVE-2016-2107)
- Fix EVP_EncodeUpdate overflow (CVE-2016-2105)
- Fix EVP_EncryptUpdate overflow (CVE-2016-2106)
- Prevent ASN.1 BIO excessive memory allocation (CVE-2016-2109)
- EBCDIC overread (CVE-2016-2176)
- Modify behavior of ALPN to invoke callback after SNI/servername callback, such that updates to the SSL_CTX affect ALPN.
- Remove LOW from the DEFAULT cipher list. This removes singles DES from the default.
- Only remove the SSLv2 methods with the no-ssl2-method option.
Merge branch 'dev-1.0.2h'
Elan Ruusamäe [Thu, 28 Apr 2016 15:48:25 +0000 (18:48 +0300)]
up to 1.0.2h snap
The release will be made available on 3rd May 2016 between approximately
1200-1500 UTC. It will fix several security defects with maximum
severity "high".
Elan Ruusamäe [Sat, 5 Mar 2016 22:21:23 +0000 (00:21 +0200)]
drop conflicts
sslv2 restored
Elan Ruusamäe [Sat, 5 Mar 2016 19:42:01 +0000 (21:42 +0200)]
- rebuild with sslv2 support
- release 7 (by relup.sh)
Elan Ruusamäe [Sat, 5 Mar 2016 13:14:27 +0000 (15:14 +0200)]
bconds were fixed in
2a82d45
Adam Osuchowski [Sat, 5 Mar 2016 13:02:23 +0000 (14:02 +0100)]
- fixed bcond ssl2/ssl3 to force build with SSLv2/SSLv3 support
Elan Ruusamäe [Fri, 4 Mar 2016 22:33:35 +0000 (00:33 +0200)]
sslv2 bcond likely doesn't work after 1.0.2g
Elan Ruusamäe [Fri, 4 Mar 2016 22:33:13 +0000 (00:33 +0200)]
qt4 QtNetwork rebuild
Elan Ruusamäe [Fri, 4 Mar 2016 08:15:45 +0000 (10:15 +0200)]
python3 rebuild
Elan Ruusamäe [Fri, 4 Mar 2016 08:12:19 +0000 (10:12 +0200)]
python2 rebuild
Elan Ruusamäe [Thu, 3 Mar 2016 15:54:20 +0000 (17:54 +0200)]
- release 5 (by relup.sh)
Elan Ruusamäe [Thu, 3 Mar 2016 12:09:30 +0000 (14:09 +0200)]
curl rebuild
configure:29155: checking for curl_easy_perform in -lcurl
configure:29180: ccache gcc -o conftest -O2 -fwrapv -pipe -Wformat -Werror=format-security -gdwarf-4 -fno-debug-types-section -fvar-tracking-assignments -g2 -Wp,-D_FORTIFY_SOURCE=2
/usr/lib/gcc/i686-pld-linux/5.3.0/../../../libcurl.so: undefined reference to `SSLv2_client_method'
collect2: error: ld returned 1 exit status
altho this dependency is compile time, it's easier to mark it here than
all rebuilt programs that link with curl (php55-openssl, php56-openssl, ...)
Elan Ruusamäe [Thu, 3 Mar 2016 12:01:42 +0000 (14:01 +0200)]
php 5.4 rebuild needed
This page took 0.330063 seconds and 4 git commands to generate.