Changelog for
openssl-static-1.1.1k-14.el8_6.x86_64.rpm :
* Tue Sep 17 2024 Maurizio Barbaro
- 1:1.1.1k-14- Backport fix SSL_select_next proto from OpenSSL 3.2 Fix CVE-2024-5535 Resolves: RHEL-45654
* Thu Nov 30 2023 Dmitry Belyavskiy - 1:1.1.1k-12- Backport implicit rejection mechanism for RSA PKCS#1 v1.5 to RHEL-8 series (a proper fix for CVE-2020-25659) Resolves: RHEL-17694
* Wed Nov 15 2023 Clemens Lang - 1:1.1.1k-11- Fix CVE-2023-5678: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow Resolves: RHEL-16536
* Thu Oct 19 2023 Clemens Lang - 1:1.1.1k-10- Fix CVE-2023-3446: Excessive time spent checking DH keys and parameters Resolves: RHEL-14243- Fix CVE-2023-3817: Excessive time spent checking DH q parameter value Resolves: RHEL-14237
* Thu May 04 2023 Dmitry Belyavskiy - 1:1.1.1k-9- Fixed Timing Oracle in RSA Decryption Resolves: CVE-2022-4304- Fixed Double free after calling PEM_read_bio_ex Resolves: CVE-2022-4450- Fixed Use-after-free following BIO_new_NDEF Resolves: CVE-2023-0215
* Wed Feb 08 2023 Dmitry Belyavskiy - 1:1.1.1k-8- Fixed X.400 address type confusion in X.509 GeneralName Resolves: CVE-2023-0286
* Tue Jul 05 2022 Clemens Lang - 1:1.1.1k-7- Fix CVE-2022-2097: AES OCB fails to encrypt some bytes on 32-bit x86 Resolves: CVE-2022-2097- Update expired certificates used in the testsuite Resolves: rhbz#2100554- Fix CVE-2022-1292: openssl: c_rehash script allows command injection Resolves: rhbz#2090371- Fix CVE-2022-2068: the c_rehash script allows command injection Resolves: rhbz#2098278
* Wed Mar 23 2022 Clemens Lang - 1:1.1.1k-6- Fixes CVE-2022-0778 openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates- Resolves: rhbz#2067145
* Tue Nov 16 2021 Sahana Prasad - 1:1.1.1k-5- Fixes CVE-2021-3712 openssl: Read buffer overruns processing ASN.1 strings- Resolves: rhbz#2005402
* Fri Jul 16 2021 Sahana Prasad - 1:1.1.1k-4- Fixes bugs in s390x AES code.- Uses the first detected address family if IPv6 is not available- Reverts the changes in https://github.com/openssl/openssl/pull/13305 as it introduces a regression if server has a DSA key pair, the handshake fails when the protocol is not explicitly set to TLS 1.2. However, if the patch is reverted, it has an effect on the \"ssl_reject_handshake\" feature in nginx. Although, this feature will continue to work, TLS 1.3 protocol becomes unavailable/disabled. This is already known - https://trac.nginx.org/nginx/ticket/2071#comment:1 As per https://github.com/openssl/openssl/issues/16075#issuecomment-879939938, nginx could early callback instead of servername callback.- Resolves: rhbz#1978214- Related: rhbz#1934534
* Thu Jun 24 2021 Sahana Prasad - 1:1.1.1k-3- Cleansup the peer point formats on renegotiation- Resolves rhbz#1965362
* Wed Jun 23 2021 Dmitry Belyavskiy - 1:1.1.1k-2- Fixes FIPS_selftest to work in FIPS mode. Resolves: rhbz#1940085- Using safe primes for FIPS DH self-test
* Mon May 24 2021 Sahana Prasad 1.1.1k-1- Update to version 1.1.1k
* Mon Apr 26 2021 Daiki Ueno 1.1.1g-16- Use AI_ADDRCONFIG only when explicit host name is given- Allow only curves defined in RFC 8446 in TLS 1.3
* Fri Apr 16 2021 Dmitry Belyavski 1.1.1g-15- Remove 2-key 3DES test from FIPS_selftest
* Mon Mar 29 2021 Sahana Prasad 1.1.1g-14- Fix CVE-2021-3450 openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT- Fix CVE-2021-3449 NULL pointer deref in signature_algorithms processing
* Fri Dec 04 2020 Sahana Prasad 1.1.1g-13- Fix CVE-2020-1971 ediparty null pointer dereference
* Fri Oct 23 2020 Tomáš Mráz 1.1.1g-12- Implemented new FIPS requirements in regards to KDF and DH selftests- Disallow certificates with explicit EC parameters
* Mon Jul 20 2020 Tomáš Mráz 1.1.1g-11- Further changes for SP 800-56A rev3 requirements
* Tue Jun 23 2020 Tomáš Mráz 1.1.1g-9- Rewire FIPS_drbg API to use the RAND_DRBG- Use the well known DH groups in TLS even for 2048 and 1024 bit parameters
* Mon Jun 08 2020 Tomáš Mráz 1.1.1g-7- Disallow dropping Extended Master Secret extension on renegotiation- Return alert from s_server if ALPN protocol does not match- SHA1 is allowed in AATTSECLEVEL=2 only if allowed by TLS SigAlgs configuration
* Wed Jun 03 2020 Tomáš Mráz 1.1.1g-6- Add FIPS selftest for PBKDF2 and KBKDF
* Wed May 27 2020 Tomáš Mráz 1.1.1g-5- Allow only well known DH groups in the FIPS mode
* Mon May 18 2020 Tomáš Mráz 1.1.1g-1- update to the 1.1.1g release- FIPS module installed state definition is modified
* Thu Mar 05 2020 Tomáš Mráz 1.1.1c-15- add selftest of the RAND_DRBG implementation
* Wed Feb 19 2020 Tomáš Mráz 1.1.1c-14- fix incorrect error return value from FIPS_selftest_dsa- S390x: properly restore SIGILL signal handler
* Wed Dec 04 2019 Tomáš Mráz 1.1.1c-12- additional fix for the edk2 build
* Tue Nov 26 2019 Tomáš Mráz 1.1.1c-9- disallow use of SHA-1 signatures in TLS in FIPS mode
* Mon Nov 25 2019 Tomáš Mráz 1.1.1c-8- fix CVE-2019-1547 - side-channel weak encryption vulnerability- fix CVE-2019-1563 - padding oracle in CMS API- fix CVE-2019-1549 - ensure fork safety of the DRBG- fix handling of non-FIPS allowed EC curves in FIPS mode- fix TLS compliance issues
* Thu Nov 21 2019 Tomáš Mráz 1.1.1c-7- backported ARM performance fixes from master
* Wed Nov 20 2019 Tomáš Mráz 1.1.1c-6- backport of S390x ECC CPACF enhancements from master- FIPS mode: properly disable 1024 bit DSA key generation- FIPS mode: skip ED25519 and ED448 algorithms in openssl speed- FIPS mode: allow AES-CCM ciphersuites
* Tue Nov 19 2019 Tomáš Mráz 1.1.1c-5- make the code suitable for edk2 build
* Thu Nov 14 2019 Tomáš Mráz 1.1.1c-4- backport of SSKDF from master
* Wed Nov 13 2019 Tomáš Mráz 1.1.1c-3- backport of KBKDF and KRB5KDF from master
* Mon Jun 24 2019 Tomáš Mráz 1.1.1c-2- do not try to use EC groups disallowed in FIPS mode in TLS- fix Valgrind regression with constant-time code
* Mon Jun 03 2019 Tomáš Mráz 1.1.1c-1- update to the 1.1.1c release
* Fri May 24 2019 Tomáš Mráz 1.1.1b-6- adjust the default cert pbe algorithm for pkcs12 -export in the FIPS mode
* Fri May 10 2019 Tomáš Mráz 1.1.1b-5- Fix small regressions related to the rebase
* Tue May 07 2019 Tomáš Mráz 1.1.1b-3- FIPS compliance fixes
* Tue May 07 2019 Tomáš Mráz 1.1.1b-1- update to the 1.1.1b release- EVP_KDF API backport from master- SSH KDF implementation for EVP_KDF API backport from master- add S390x chacha20-poly1305 assembler support from master branch
* Fri Dec 14 2018 Tomáš Mráz 1.1.1-8- make openssl ts default to using SHA256 digest
* Wed Nov 14 2018 Tomáš Mráz 1.1.1-7- use /dev/urandom for seeding the RNG in FIPS POST
* Mon Oct 15 2018 Tomáš Mráz 1.1.1-6- make SECLEVEL=3 work
* Tue Oct 09 2018 Tomáš Mráz 1.1.1-5- fix defects found in Coverity scan
* Mon Oct 01 2018 Tomáš Mráz 1.1.1-4- drop SSLv3 support
* Tue Sep 25 2018 Tomáš Mráz 1.1.1-3- drop the TLS-1.3 version revert
* Mon Sep 17 2018 Tomáš Mráz 1.1.1-2- disable RC4-MD5 ciphersuites completely
* Fri Sep 14 2018 Tomáš Mráz 1.1.1-1- update to the final 1.1.1 version- for consistent support of security policies we build RC4 support in TLS (not default) and allow SHA1 in SECLEVEL 2- use only /dev/urandom if getrandom() is not available- disable SM4
* Thu Aug 23 2018 Tomáš Mráz 1.1.1-0.pre9.1- update to the latest 1.1.1 beta version- temporarily revert TLS-1.3 to draft 28 version
* Mon Aug 13 2018 Tomáš Mráz 1.1.1-0.pre8.4- bidirectional shutdown fixes from upstream
* Mon Aug 13 2018 Tomáš Mráz 1.1.1-0.pre8.3- do not put error on stack when using fixed protocol version with the default config (#1615098)
* Fri Jul 27 2018 Tomáš Mráz 1.1.1-0.pre8.2- load crypto policy config file from the default config
* Wed Jul 25 2018 Tomáš Mráz 1.1.1-0.pre8- update to the latest 1.1.1 beta version
* Fri Jul 13 2018 Fedora Release Engineering - 1:1.1.0h-6- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
* Tue Jun 19 2018 Tomáš Mráz 1.1.0h-5- fix FIPS RSA key generation failure
* Mon Jun 04 2018 Tomáš Mráz 1.1.0h-4- ppc64le is not multilib arch (#1584994)
* Tue Apr 03 2018 Tomáš Mráz 1.1.0h-3- fix regression of c_rehash (#1562953)
* Thu Mar 29 2018 Tomáš Mráz 1.1.0h-2- fix FIPS symbol versions
* Thu Mar 29 2018 Tomáš Mráz 1.1.0h-1- update to upstream version 1.1.0h- add Recommends for openssl-pkcs11
* Fri Feb 23 2018 Tomáš Mráz 1.1.0g-6- one more try to apply RPM_LD_FLAGS properly (#1541033)- dropped unneeded starttls xmpp patch (#1417017)
* Thu Feb 08 2018 Fedora Release Engineering - 1:1.1.0g-5- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
* Thu Feb 01 2018 Tomáš Mráz 1.1.0g-4- apply RPM_LD_FLAGS properly (#1541033)
* Thu Jan 11 2018 Tomáš Mráz 1.1.0g-3- silence the .rnd write failure as that is auxiliary functionality (#1524833)
* Thu Dec 14 2017 Tomáš Mráz 1.1.0g-2- put the Makefile.certificate in pkgdocdir and drop the requirement on make
* Fri Nov 03 2017 Tomáš Mráz 1.1.0g-1- update to upstream version 1.1.0g
* Thu Aug 03 2017 Fedora Release Engineering - 1:1.1.0f-9- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild
* Thu Jul 27 2017 Fedora Release Engineering - 1:1.1.0f-8- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
* Mon Jul 17 2017 Tomáš Mráz 1:1.1.0f-7- make s_client and s_server work with -ssl3 option (#1471783)
* Thu Jul 13 2017 Petr Pisar - 1:1.1.0f-6- perl dependency renamed to perl-interpreter
* Mon Jun 26 2017 Tomáš Mráz 1.1.0f-5- disable verification of all insecure hashes
* Fri Jun 23 2017 Tomáš Mráz 1.1.0f-4- make DTLS work (#1462541)
* Thu Jun 15 2017 Tomáš Mráz 1.1.0f-3- enable 3DES SSL ciphersuites, RC4 is kept disabled (#1453066)
* Mon Jun 05 2017 Tomáš Mráz 1.1.0f-2- only release thread-local key if we created it (from upstream) (#1458775)
* Fri Jun 02 2017 Tomáš Mráz 1.1.0f-1- update to upstream version 1.1.0f- SRP and GOST is now allowed, note that GOST support requires adding GOST engine which is not part of openssl anymore
* Thu Feb 16 2017 Tomáš Mráz 1.1.0e-1- update to upstream version 1.1.0e- add documentation of the PROFILE=SYSTEM special cipher string (#1420232)
* Sat Feb 11 2017 Fedora Release Engineering - 1:1.1.0d-3- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
* Wed Feb 01 2017 Tomáš Mráz 1.1.0d-2- applied upstream fixes (fix regression in X509_CRL_digest)
* Thu Jan 26 2017 Tomáš Mráz 1.1.0d-1- update to upstream version 1.1.0d
* Thu Dec 22 2016 Tomáš Mráz 1.1.0c-5- preserve new line in fd BIO BIO_gets() as other BIOs do
* Fri Dec 02 2016 Tomáš Mráz 1.1.0c-4- FIPS mode fixes for TLS
* Wed Nov 30 2016 Tomáš Mráz 1.1.0c-3- revert SSL_read() behavior change - patch from upstream (#1394677)- fix behavior on client certificate request in renegotiation (#1393579)
* Tue Nov 22 2016 Tomáš Mráz 1.1.0c-2- EC curve NIST P-224 is now allowed, still kept disabled in TLS due to less than optimal security
* Fri Nov 11 2016 Tomáš Mráz 1.1.0c-1- update to upstream version 1.1.0c
* Fri Nov 04 2016 Tomáš Mráz 1.1.0b-4- use a random seed if the supplied one did not generate valid parameters in dsa_builtin_paramgen2()
* Wed Oct 12 2016 Tomáš Mráz 1.1.0b-3- do not break contract on return value when using dsa_builtin_paramgen2()
* Wed Oct 12 2016 Tomáš Mráz 1.1.0b-2- fix afalg failure on big endian
* Tue Oct 11 2016 Tomáš Mráz 1.1.0b-1- update to upstream version 1.1.0b
* Fri Oct 07 2016 Richard W.M. Jones - 1:1.0.2j-2- Add flags for riscv64.
* Mon Sep 26 2016 Tomáš Mráz 1.0.2j-1- minor upstream release 1.0.2j fixing regression from previous release
* Sat Sep 24 2016 David Woodhouse 1.0.2i-2- Fix enginesdir in libcrypto.c (#1375361)
* Thu Sep 22 2016 Tomáš Mráz 1.0.2i-1- minor upstream release 1.0.2i fixing security issues- move man pages for perl based scripts to perl subpackage (#1377617)
* Wed Aug 10 2016 Tomáš Mráz 1.0.2h-3- fix regression in Cisco AnyConnect VPN support (#1354588)
* Mon Jun 27 2016 Tomáš Mráz 1.0.2h-2- require libcrypto in libssl.pc (#1301301)
* Tue May 03 2016 Tomáš Mráz 1.0.2h-1- minor upstream release 1.0.2h fixing security issues
* Tue Mar 29 2016 Tomáš Mráz 1.0.2g-4- disable SSLv2 support altogether (without ABI break)
* Mon Mar 07 2016 Tom Callaway - 1.0.2g-3- enable RC5
* Wed Mar 02 2016 Tomáš Mráz 1.0.2g-2- reenable SSL2 in the build to avoid ABI break (it does not make the openssl vulnerable to DROWN attack)
* Tue Mar 01 2016 Tomáš Mráz 1.0.2g-1- minor upstream release 1.0.2g fixing security issues
* Thu Feb 04 2016 Fedora Release Engineering - 1:1.0.2f-2- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild
* Thu Jan 28 2016 Tomáš Mráz 1.0.2f-1- minor upstream release 1.0.2f fixing security issues- add support for MIPS secondary architecture
* Fri Jan 15 2016 Tomáš Mráz 1.0.2e-5- document some options of openssl speed command
* Fri Dec 18 2015 Tomáš Mráz 1.0.2e-4- enable sctp support in DTLS
* Tue Dec 08 2015 Tomáš Mráz 1.0.2e-3- remove unimplemented EC method from header (#1289599)
* Mon Dec 07 2015 Tomáš Mráz 1.0.2e-2- the fast nistp implementation works only on little endian architectures
* Fri Dec 04 2015 Tomáš Mráz 1.0.2e-1- minor upstream release 1.0.2e fixing moderate severity security issues- enable fast assembler implementation for NIST P-256 and P-521 elliptic curves (#1164210)- filter out unwanted link options from the .pc files (#1257836)- do not set serial to 0 in Makefile.certificate (#1135719)
* Mon Nov 16 2015 Tomáš Mráz 1.0.2d-3- fix sigill on some AMD CPUs (#1278194)
* Wed Aug 12 2015 Tom Callaway 1.0.2d-2- re-enable secp256k1 (bz1021898)
* Thu Jul 09 2015 Tomáš Mráz 1.0.2d-1- minor upstream release 1.0.2d fixing a high severity security issue
* Tue Jul 07 2015 Tomáš Mráz 1.0.2c-3- fix the aarch64 build
* Thu Jun 18 2015 Fedora Release Engineering - 1:1.0.2c-2- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
* Mon Jun 15 2015 Tomáš Mráz 1.0.2c-1- minor upstream release 1.0.2c fixing multiple security issues
* Thu May 07 2015 Peter Robinson 1.0.2a-4- Add aarch64 sslarch details
* Thu May 07 2015 Tomáš Mráz 1.0.2a-3- fix some 64 bit build targets
* Tue Apr 28 2015 Tomáš Mráz 1.0.2a-2- add alternative certificate chain discovery support from upstream
* Thu Apr 23 2015 Tomáš Mráz 1.0.2a-1- rebase to 1.0.2 branch
* Thu Apr 09 2015 Tomáš Mráz 1.0.1k-7- drop the AES-GCM restriction of 2^32 operations because the IV is always 96 bits (32 bit fixed field + 64 bit invocation field)
* Thu Mar 19 2015 Tomáš Mráz 1.0.1k-6- fix CVE-2015-0209 - potential use after free in d2i_ECPrivateKey()- fix CVE-2015-0286 - improper handling of ASN.1 boolean comparison- fix CVE-2015-0287 - ASN.1 structure reuse decoding memory corruption- fix CVE-2015-0289 - NULL dereference decoding invalid PKCS#7 data- fix CVE-2015-0293 - triggerable assert in SSLv2 server
* Mon Mar 16 2015 Tomáš Mráz 1.0.1k-5- fix bug in the CRYPTO_128_unwrap()
* Fri Feb 27 2015 Tomáš Mráz 1.0.1k-4- fix bug in the RFC 5649 support (#1185878)
* Sat Feb 21 2015 Till Maas - 1:1.0.1k-3- Rebuilt for Fedora 23 Change https://fedoraproject.org/wiki/Changes/Harden_all_packages_with_position-independent_code
* Thu Jan 15 2015 Tomáš Mráz 1.0.1k-2- test in the non-FIPS RSA keygen for minimal distance of p and q similarly to the FIPS RSA keygen
* Fri Jan 09 2015 Tomáš Mráz 1.0.1k-1- new upstream release fixing multiple security issues
* Thu Nov 20 2014 Tomáš Mráz 1.0.1j-3- disable SSLv3 by default again (mail servers and possibly LDAP servers should probably allow it explicitly for legacy clients)
* Tue Oct 21 2014 Tomáš Mráz 1.0.1j-2- update the FIPS RSA keygen to be FIPS 186-4 compliant
* Thu Oct 16 2014 Tomáš Mráz 1.0.1j-1- new upstream release fixing multiple security issues
* Fri Oct 10 2014 Tomáš Mráz 1.0.1i-5- copy negotiated digests when switching certs by SNI (#1150032)
* Mon Sep 08 2014 Tomáš Mráz 1.0.1i-4- add support for RFC 5649
* Sun Aug 17 2014 Fedora Release Engineering - 1:1.0.1i-3- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Wed Aug 13 2014 Tomáš Mráz 1.0.1i-2- drop RSA X9.31 from RSA FIPS selftests- add Power 8 optimalizations
* Thu Aug 07 2014 Tomáš Mráz 1.0.1i-1- new upstream release fixing multiple moderate security issues- for now disable only SSLv2 by default
* Fri Jul 18 2014 Tom Callaway 1.0.1h-6- fix license handling
* Mon Jun 30 2014 Tomáš Mráz 1.0.1h-5- disable SSLv2 and SSLv3 protocols by default (can be enabled via appropriate SSL_CTX_clear_options() call)
* Wed Jun 11 2014 Tomáš Mráz 1.0.1h-4- use system profile for default cipher list
* Tue Jun 10 2014 Tomáš Mráz 1.0.1h-3- make FIPS mode keygen bit length restriction enforced only when OPENSSL_ENFORCE_MODULUS_BITS is set- fix CVE-2014-0224 fix that broke EAP-FAST session resumption support
* Sat Jun 07 2014 Fedora Release Engineering - 1:1.0.1h-2- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Thu Jun 05 2014 Tomáš Mráz 1.0.1h-1- new upstream release 1.0.1h
* Sat May 31 2014 Peter Robinson 1.0.1g-2- Drop obsolete and irrelevant docs- Move devel docs to appropriate package
* Wed May 07 2014 Tomáš Mráz 1.0.1g-1- new upstream release 1.0.1g- do not include ECC ciphersuites in SSLv2 client hello (#1090952)- fail on hmac integrity check if the .hmac file is empty
* Mon Apr 07 2014 Dennis Gilmore - 1.0.1e-44- pull in upstream patch for CVE-2014-0160- removed CHANGES file portion from patch for expediency
* Thu Apr 03 2014 Tomáš Mráz 1.0.1e-43- add support for ppc64le architecture (#1072633)
* Mon Mar 17 2014 Tomáš Mráz 1.0.1e-42- properly detect encryption failure in BIO- use 2048 bit RSA key in FIPS selftests
* Fri Feb 14 2014 Tomáš Mráz 1.0.1e-41- use the key length from configuration file if req -newkey rsa is invoked
* Thu Feb 13 2014 Tomáš Mráz 1.0.1e-40- print ephemeral key size negotiated in TLS handshake (#1057715)- add DH_compute_key_padded needed for FIPS CAVS testing
* Thu Feb 06 2014 Tomáš Mráz 1.0.1e-39- make expiration and key length changeable by DAYS and KEYLEN variables in the certificate Makefile (#1058108)- change default hash to sha256 (#1062325)
* Wed Jan 22 2014 Tomáš Mráz 1.0.1e-38- make 3des strength to be 128 bits instead of 168 (#1056616)
* Tue Jan 07 2014 Tomáš Mráz 1.0.1e-37- fix CVE-2013-4353 - Invalid TLS handshake crash- fix CVE-2013-6450 - possible MiTM attack on DTLS1
* Fri Dec 20 2013 Tomáš Mráz 1.0.1e-36- fix CVE-2013-6449 - crash when version in SSL structure is incorrect- more FIPS validation requirement changes
* Wed Dec 18 2013 Tomáš Mráz 1.0.1e-35- drop weak ciphers from the default TLS ciphersuite list- add back some symbols that were dropped with update to 1.0.1 branch- more FIPS validation requirement changes
* Tue Nov 19 2013 Tomáš Mráz 1.0.1e-34- fix locking and reseeding problems with FIPS drbg
* Fri Nov 15 2013 Tomáš Mráz 1.0.1e-33- additional changes required for FIPS validation
* Wed Nov 13 2013 Tomáš Mráz 1.0.1e-32- disable verification of certificate, CRL, and OCSP signatures using MD5 if OPENSSL_ENABLE_MD5_VERIFY environment variable is not set
* Fri Nov 08 2013 Tomáš Mráz 1.0.1e-31- add back support for secp521r1 EC curve- add aarch64 to Configure (#969692)
* Tue Oct 29 2013 Tomáš Mráz 1.0.1e-30- fix misdetection of RDRAND support on Cyrix CPUS (from upstream) (#1022346)
* Thu Oct 24 2013 Tomáš Mráz 1.0.1e-29- do not advertise ECC curves we do not support (#1022493)
* Wed Oct 16 2013 Tomáš Mráz 1.0.1e-28- only ECC NIST Suite B curves support- drop -fips subpackage
* Mon Oct 14 2013 Tom Callaway - 1.0.1e-27- resolve bugzilla 319901 (phew! only took 6 years & 9 days)
* Fri Sep 27 2013 Tomáš Mráz 1.0.1e-26- make DTLS1 work in FIPS mode- avoid RSA and DSA 512 bits and Whirlpool in \'openssl speed\' in FIPS mode
* Mon Sep 23 2013 Tomáš Mráz 1.0.1e-25- avoid dlopening libssl.so from libcrypto (#1010357)
* Fri Sep 20 2013 Tomáš Mráz 1.0.1e-24- fix small memory leak in FIPS aes selftest
* Thu Sep 19 2013 Tomáš Mráz 1.0.1e-23- fix segfault in openssl speed hmac in the FIPS mode
* Thu Sep 12 2013 Tomáš Mráz 1.0.1e-22- document the nextprotoneg option in manual pages original patch by Hubert Kario
* Tue Sep 10 2013 Kyle McMartin 1.0.1e-21- [arm] use elf auxv to figure out armcap.c instead of playing silly games with SIGILL handlers. (#1006474)
* Wed Sep 04 2013 Tomas Mraz 1.0.1e-20- try to avoid some races when updating the -fips subpackage
* Mon Sep 02 2013 Tomas Mraz 1.0.1e-19- use version-release in .hmac suffix to avoid overwrite during upgrade
* Thu Aug 29 2013 Tomas Mraz 1.0.1e-18- allow deinitialization of the FIPS mode
* Thu Aug 29 2013 Tomas Mraz 1.0.1e-17- always perform the FIPS selftests in library constructor if FIPS module is installed
* Tue Aug 27 2013 Tomas Mraz 1.0.1e-16- add -fips subpackage that contains the FIPS module files
* Fri Aug 16 2013 Tomas Mraz 1.0.1e-15- fix use of rdrand if available- more commits cherry picked from upstream- documentation fixes
* Sat Aug 03 2013 Petr Pisar - 1:1.0.1e-14- Perl 5.18 rebuild
* Fri Jul 26 2013 Tomas Mraz 1.0.1e-13- additional manual page fix- use symbol versioning also for the textual version
* Thu Jul 25 2013 Tomas Mraz 1.0.1e-12- additional manual page fixes
* Fri Jul 19 2013 Tomas Mraz 1.0.1e-11- use _prefix macro
* Wed Jul 17 2013 Petr Pisar - 1:1.0.1e-10- Perl 5.18 rebuild
* Thu Jul 11 2013 Tomas Mraz 1.0.1e-9- add openssl.cnf.5 manpage symlink to config.5
* Wed Jul 10 2013 Tomas Mraz 1.0.1e-8- add relro linking flag
* Wed Jul 10 2013 Tomas Mraz 1.0.1e-7- add support for the -trusted_first option for certificate chain verification
* Fri May 03 2013 Tomas Mraz 1.0.1e-6- fix build of manual pages with current pod2man (#959439)
* Sun Apr 21 2013 Peter Robinson 1.0.1e-5- Enable ARM optimised build
* Mon Mar 18 2013 Tomas Mraz 1.0.1e-4- fix random bad record mac errors (#918981)
* Tue Feb 19 2013 Tomas Mraz 1.0.1e-3- fix up the SHLIB_VERSION_NUMBER
* Tue Feb 19 2013 Tomas Mraz 1.0.1e-2- disable ZLIB loading by default (due to CRIME attack)
* Tue Feb 19 2013 Tomas Mraz 1.0.1e-1- new upstream version
* Wed Jan 30 2013 Tomas Mraz 1.0.1c-12- more fixes from upstream- fix errors in manual causing build failure (#904777)
* Fri Dec 21 2012 Tomas Mraz 1.0.1c-11- add script for renewal of a self-signed cert by Philip Prindeville (#871566)- allow X509_issuer_and_serial_hash() produce correct result in the FIPS mode (#881336)
* Thu Dec 06 2012 Tomas Mraz 1.0.1c-10- do not load default verify paths if CApath or CAfile specified (#884305)
* Tue Nov 20 2012 Tomas Mraz 1.0.1c-9- more fixes from upstream CVS- fix DSA key pairwise check (#878597)
* Thu Nov 15 2012 Tomas Mraz 1.0.1c-8- use 1024 bit DH parameters in s_server as 512 bit is not allowed in FIPS mode and it is quite weak anyway
* Mon Sep 10 2012 Tomas Mraz 1.0.1c-7- add missing initialization of str in aes_ccm_init_key (#853963)- add important patches from upstream CVS- use the secure_getenv() with new glibc
* Fri Jul 20 2012 Fedora Release Engineering - 1:1.0.1c-6- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
* Fri Jul 13 2012 Tomas Mraz 1.0.1c-5- use __getenv_secure() instead of __libc_enable_secure
* Fri Jul 13 2012 Tomas Mraz 1.0.1c-4- do not move libcrypto to /lib- do not use environment variables if __libc_enable_secure is on- fix strict aliasing problems in modes
* Thu Jul 12 2012 Tomas Mraz 1.0.1c-3- fix DSA key generation in FIPS mode (#833866)- allow duplicate FIPS_mode_set(1)- enable build on ppc64 subarch (#834652)
* Wed Jul 11 2012 Tomas Mraz 1.0.1c-2- fix s_server with new glibc when no global IPv6 address (#839031)- make it build with new Perl
* Tue May 15 2012 Tomas Mraz 1.0.1c-1- new upstream version
* Thu Apr 26 2012 Tomas Mraz 1.0.1b-1- new upstream version
* Fri Apr 20 2012 Tomas Mraz 1.0.1a-1- new upstream version fixing CVE-2012-2110
* Wed Apr 11 2012 Tomas Mraz 1.0.1-3- add Kerberos 5 libraries to pkgconfig for static linking (#807050)
* Thu Apr 05 2012 Tomas Mraz 1.0.1-2- backports from upstream CVS- fix segfault when /dev/urandom is not available (#809586)
* Wed Mar 14 2012 Tomas Mraz 1.0.1-1- new upstream release
* Mon Mar 05 2012 Tomas Mraz 1.0.1-0.3.beta3- add obsoletes to assist multilib updates (#799636)
* Wed Feb 29 2012 Tomas Mraz 1.0.1-0.2.beta3- epoch bumped to 1 due to revert to 1.0.0g on Fedora 17- new upstream release from the 1.0.1 branch- fix s390x build (#798411)- versioning for the SSLeay symbol (#794950)- add -DPURIFY to build flags (#797323)- filter engine provides- split the libraries to a separate -libs package- add make to requires on the base package (#783446)
* Tue Feb 07 2012 Tomas Mraz 1.0.1-0.1.beta2- new upstream release from the 1.0.1 branch, ABI compatible- add documentation for the -no_ign_eof option
* Thu Jan 19 2012 Tomas Mraz 1.0.0g-1- new upstream release fixing CVE-2012-0050 - DoS regression in DTLS support introduced by the previous release (#782795)
* Thu Jan 05 2012 Tomas Mraz 1.0.0f-1- new upstream release fixing multiple CVEs
* Tue Nov 22 2011 Tomas Mraz 1.0.0e-4- move the libraries needed for static linking to Libs.private
* Thu Nov 03 2011 Tomas Mraz 1.0.0e-3- do not use AVX instructions when osxsave bit not set- add direct known answer tests for SHA2 algorithms
* Wed Sep 21 2011 Tomas Mraz 1.0.0e-2- fix missing initialization of variable in CHIL engine
* Wed Sep 07 2011 Tomas Mraz 1.0.0e-1- new upstream release fixing CVE-2011-3207 (#736088)
* Wed Aug 24 2011 Tomas Mraz 1.0.0d-8- drop the separate engine for Intel acceleration improvements and merge in the AES-NI, SHA1, and RC4 optimizations- add support for OPENSSL_DISABLE_AES_NI environment variable that disables the AES-NI support
* Tue Jul 26 2011 Tomas Mraz 1.0.0d-7- correct openssl cms help output (#636266)- more tolerant starttls detection in XMPP protocol (#608239)
* Wed Jul 20 2011 Tomas Mraz 1.0.0d-6- add support for newest Intel acceleration improvements backported from upstream by Intel in form of a separate engine
* Thu Jun 09 2011 Tomas Mraz 1.0.0d-5- allow the AES-NI engine in the FIPS mode
* Tue May 24 2011 Tomas Mraz 1.0.0d-4- add API necessary for CAVS testing of the new DSA parameter generation
* Thu Apr 28 2011 Tomas Mraz 1.0.0d-3- add support for VIA Padlock on 64bit arch from upstream (#617539)- do not return bogus values from load_certs (#652286)
* Tue Apr 05 2011 Tomas Mraz 1.0.0d-2- clarify apps help texts for available digest algorithms (#693858)
* Thu Feb 10 2011 Tomas Mraz 1.0.0d-1- new upstream release fixing CVE-2011-0014 (OCSP stapling vulnerability)
* Tue Feb 08 2011 Fedora Release Engineering - 1.0.0c-4- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
* Fri Feb 04 2011 Tomas Mraz 1.0.0c-3- add -x931 parameter to openssl genrsa command to use the ANSI X9.31 key generation method- use FIPS-186-3 method for DSA parameter generation- add OPENSSL_FIPS_NON_APPROVED_MD5_ALLOW environment variable to allow using MD5 when the system is in the maintenance state even if the /proc fips flag is on- make openssl pkcs12 command work by default in the FIPS mode
* Mon Jan 24 2011 Tomas Mraz 1.0.0c-2- listen on ipv6 wildcard in s_server so we accept connections from both ipv4 and ipv6 (#601612)- fix openssl speed command so it can be used in the FIPS mode with FIPS allowed ciphers
* Fri Dec 03 2010 Tomas Mraz 1.0.0c-1- new upstream version fixing CVE-2010-4180
* Tue Nov 23 2010 Tomas Mraz 1.0.0b-3- replace the revert for the s390x bignum asm routines with fix from upstream
* Mon Nov 22 2010 Tomas Mraz 1.0.0b-2- revert upstream change in s390x bignum asm routines
* Tue Nov 16 2010 Tomas Mraz 1.0.0b-1- new upstream version fixing CVE-2010-3864 (#649304)
* Tue Sep 07 2010 Tomas Mraz 1.0.0a-3- make SHLIB_VERSION reflect the library suffix
* Wed Jun 30 2010 Tomas Mraz 1.0.0a-2- openssl man page fix (#609484)
* Fri Jun 04 2010 Tomas Mraz 1.0.0a-1- new upstream patch release, fixes CVE-2010-0742 (#598738) and CVE-2010-1633 (#598732)
* Wed May 19 2010 Tomas Mraz 1.0.0-5- pkgconfig files now contain the correct libdir (#593723)
* Tue May 18 2010 Tomas Mraz 1.0.0-4- make CA dir readable - the private keys are in private subdir (#584810)
* Fri Apr 09 2010 Tomas Mraz 1.0.0-3- a few fixes from upstream CVS- move libcrypto to /lib (#559953)
* Tue Apr 06 2010 Tomas Mraz 1.0.0-2- set UTC timezone on pod2man run (#578842)- make X509_NAME_hash_old work in FIPS mode
* Tue Mar 30 2010 Tomas Mraz 1.0.0-1- update to final 1.0.0 upstream release
* Tue Feb 16 2010 Tomas Mraz 1.0.0-0.22.beta5- make TLS work in the FIPS mode
* Fri Feb 12 2010 Tomas Mraz 1.0.0-0.21.beta5- gracefully handle zero length in assembler implementations of OPENSSL_cleanse (#564029)- do not fail in s_server if client hostname not resolvable (#561260)
* Wed Jan 20 2010 Tomas Mraz 1.0.0-0.20.beta5- new upstream release
* Thu Jan 14 2010 Tomas Mraz 1.0.0-0.19.beta4- fix CVE-2009-4355 - leak in applications incorrectly calling CRYPTO_free_all_ex_data() before application exit (#546707)- upstream fix for future TLS protocol version handling
* Wed Jan 13 2010 Tomas Mraz 1.0.0-0.18.beta4- add support for Intel AES-NI
* Thu Jan 07 2010 Tomas Mraz 1.0.0-0.17.beta4- upstream fix compression handling on session resumption- various null checks and other small fixes from upstream- upstream changes for the renegotiation info according to the latest draft
* Mon Nov 23 2009 Tomas Mraz 1.0.0-0.16.beta4- fix non-fips mingw build (patch by Kalev Lember)- add IPV6 fix for DTLS
* Fri Nov 20 2009 Tomas Mraz 1.0.0-0.15.beta4- add better error reporting for the unsafe renegotiation
* Fri Nov 20 2009 Tomas Mraz 1.0.0-0.14.beta4- fix build on s390x
* Wed Nov 18 2009 Tomas Mraz 1.0.0-0.13.beta4- disable enforcement of the renegotiation extension on the client (#537962)- add fixes from the current upstream snapshot
* Fri Nov 13 2009 Tomas Mraz 1.0.0-0.12.beta4- keep the beta status in version number at 3 so we do not have to rebuild openssh and possibly other dependencies with too strict version check
* Thu Nov 12 2009 Tomas Mraz 1.0.0-0.11.beta4- update to new upstream version, no soname bump needed- fix CVE-2009-3555 - note that the fix is bypassed if SSL_OP_ALL is used so the compatibility with unfixed clients is not broken. The protocol extension is also not final.
* Fri Oct 16 2009 Tomas Mraz 1.0.0-0.10.beta3- fix use of freed memory if SSL_CTX_free() is called before SSL_free() (#521342)