* Fetch and build as udeb dependency for debian-installer.
* SECURITY UPDATE: X.509 Email Address Buffer Overflow
- debian/patches/CVE-2022-3602-1.patch: fix off by one in punycode
decoder in crypto/punycode.c, test/build.info, test/punycode_test.c,
test/recipes/04-test_punycode.t.
- debian/patches/CVE-2022-3602-2.patch: ensure the result is zero
terminated in crypto/punycode.c.
- CVE-2022-3602
* SECURITY UPDATE: legacy custom cipher issue
- debian/patches/CVE-2022-3358.patch: fix usage of custom EVP_CIPHER
objects in crypto/evp/digest.c, crypto/evp/evp_enc.c.
- CVE-2022-3358
* SECURITY UPDATE: AES OCB fails to encrypt some bytes
- debian/patches/CVE-2022-2097-1.patch: fix AES OCB encrypt/decrypt for
x86 AES-NI in crypto/aes/asm/aesni-x86.pl.
- debian/patches/CVE-2022-2097-2.patch: add AES OCB test vectors in
test/recipes/30-test_evp_data/evpciph_aes_ocb.txt.
- CVE-2022-2097
* SECURITY UPDATE: c_rehash script allows command injection
- debian/patches/CVE-2022-1292.patch: switch to upstream patch, and
apply it before c_rehash-compat.patch.
- debian/patches/CVE-2022-2068-1.patch: fix file operations in
tools/c_rehash.in.
- debian/patches/CVE-2022-2068-2.patch: drop the issuer_name_hash=
prefix from the CRL hash in tools/c_rehash.in.
- debian/patches/c_rehash-compat.patch: updated patch to apply after
the security updates.
- CVE-2022-2068
* d/p/lp1978093/*: renew some expiring test certificates (LP: #1978093)
* d/p/lp1974037/*: cherry-pick another patchset to fix regressions with the
previous lp1974037 one (LP: #1974037)
* d/p/Set-systemwide-default-settings-for-libssl-users: partially apply it on
Ubuntu to make it easier for user to change security level (LP: #1972056)
* d/p/lp1947588.patch: Cherry-picked as our patches make it very easy to
trigger the underlying bug (LP: #1947588)
* d/p/lp1968997/*: cherry-pick a patchset to fix issues with the Turkish
locale (LP: #1968997)
* SECURITY UPDATE: c_rehash script allows command injection
- debian/patches/CVE-2022-1292.patch: do not use shell to invoke
openssl in tools/c_rehash.in.
- CVE-2022-1292
* SECURITY UPDATE: OCSP_basic_verify may incorrectly verify the response
signing certificate
- debian/patches/CVE-2022-1343-1.patch: fix OCSP_basic_verify signer
certificate validation in crypto/ocsp/ocsp_vfy.c.
- debian/patches/CVE-2022-1343-2.patch: test ocsp with invalid
responses in test/recipes/80-test_ocsp.t.
- CVE-2022-1343
* SECURITY UPDATE: incorrect MAC key used in the RC4-MD5 ciphersuite
- debian/patches/CVE-2022-1434.patch: fix the RC4-MD5 cipher in
providers/implementations/ciphers/cipher_rc4_hmac_md5.c,
test/recipes/30-test_evp_data/evpciph_aes_stitched.txt,
test/recipes/30-test_evp_data/evpciph_rc4_stitched.txt.
- CVE-2022-1434
* SECURITY UPDATE: resource leakage when decoding certificates and keys
- debian/patches/CVE-2022-1473.patch: fix bug in OPENSSL_LH_flush in
crypto/lhash/lhash.c.
- CVE-2022-1473
* New upstream bugfix release (LP: #1965141)
* d/p/skip_tls1.1_seclevel3_tests.patch: new Ubuntu-specific patch for the
testsuite
* New upstream release (LP: #1955026).
+ Dropped patches, merged upstream:
- d/p/double-engine-load*
- d/p/Add-null-digest-implementation-to-the-default-provid.patch
- d/p/Don-t-create-an-ECX-key-with-short-keys.patch
+ Refreshed patches:
- d/p/c_rehash-compat.patch
* Cherry-pick upstream fixes to prevent double engine loading (LP: #1951943)
* Manual merge of version 3.0.0-1 from Debian experimental, remaining
changes:
- Replace duplicate files in the doc directory with symlinks.
- debian/libssl1.1.postinst:
+ Display a system restart required notification on libssl1.1
upgrade on servers, unless needrestart is available.
+ Use a different priority for libssl1.1/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
+ Skip services restart & reboot notification if needrestart is in-use.
+ Bump version check to to 1.1.1.
+ Import libraries/restart-without-asking template as used by above.
- Revert "Enable system default config to enforce TLS1.2 as a
minimum" & "Increase default security level from 1 to 2".
- Reword the NEWS entry, as applicable on Ubuntu.
- Set OPENSSL_TLS_SECURITY_LEVEL=2 as compiled-in minimum security
level. Change meaning of SECURITY_LEVEL=2 to prohibit TLS versions
below 1.2 and update documentation. Previous default of 1, can be set
by calling SSL_CTX_set_security_level(), SSL_set_security_level() or
using ':@SECLEVEL=1' CipherString value in openssl.cfg.
- Add support for building with noudeb build profile.
* d/p/Don-t-create-an-ECX-key-with-short-keys.patch:
Backported from upstream to fix a regression with short keys (LP: #1946213)
* d/p/Add-null-digest-implementation-to-the-default-provid.patch:
Backported from upstream to fix a compatibility issue with 1.1.1l
* Manually call dh_installdirs to fix build failure
* Drop some Ubuntu patches merged upstream
+ The s390x series (00xx) has been applied upstream
+ The lp-1927161 Intel CET series has been applied upstream
+ CVE-2021-3449 has been fixed upstream
+ CVE-2021-3450 doesn't apply to 3.0 branch
* Refresh and adapt the remaining patches
* Import 3.0.0.
* Add avr32, patch by Vineet Gupta (Closes: #989442).
* Import 3.0.0-beta2.
* Import 3.0.0-beta1.
* Use HARNESS_VERBOSE again (otherwise the test suite might killed since no
progress is visible).
* Import 3.0.0-alpha16.
* Use VERBOSE_FAILURE to log only failures in the build log.
* Import 3.0.0-alpha15.
* Add a proposed patch from upstream to skip negativ errno number in the
testsuite to pass the testsute on hurd.
* Always link against libatomic.
* Import 3.0.0-alpha13.
* Move configuration.h to architecture specific include folder. Patch from
Antonio Terceiro (Closes: #985555).
* Enable LFS. Thanks to Dan Nicholson for debugging (Closes: #923479).
* drop `lsof', the testsuite is not using it anymore.
* Enable ktls.
* Import 3.0.0-alpha4.
* Add `lsof' which is needed by the test suite.
* Add ossl-modules to libcrypto's udeb.
* Import 3.0.0-alpha3
* Install the .so files only in the -dev package (Closes: #962548).
* Import 3.0.0-alpha1 (Closes: #934836).
* Split d/p/pr12272.patch into multiple patchfiles to fix dpkg-source
error when attempting to build a source package, due to pr12272.patch
patching files multiple times within the same patch. (LP: #1927161)
- d/p/lp-1927161-1-x86-Add-endbranch-to-indirect-branch-targets-fo.patch
- d/p/lp-1927161-2-Use-swapcontext-for-Intel-CET.patch
- d/p/lp-1927161-3-x86-Always-generate-note-gnu-property-section-f.patch
- d/p/lp-1927161-4-x86_64-Always-generate-note-gnu-property-sectio.patch
- d/p/lp-1927161-5-x86_64-Add-endbranch-at-function-entries-for-In.patch
* SECURITY UPDATE: NULL pointer deref in signature_algorithms processing
- debian/patches/CVE-2021-3449-1.patch: fix NULL pointer dereference in
ssl/statem/extensions.c.
- debian/patches/CVE-2021-3449-2.patch: teach TLSProxy how to encrypt
<= TLSv1.2 ETM records in util/perl/TLSProxy/Message.pm.
- debian/patches/CVE-2021-3449-3.patch: add a test to
test/recipes/70-test_renegotiation.t.
- debian/patches/CVE-2021-3449-4.patch: ensure buffer/length pairs are
always in sync in ssl/s3_lib.c, ssl/ssl_lib.c,
ssl/statem/extensions.c, ssl/statem/extensions_clnt.c,
ssl/statem/statem_clnt.c, ssl/statem/statem_srvr.c.
- CVE-2021-3449
* SECURITY UPDATE: CA cert check bypass with X509_V_FLAG_X509_STRICT
- debian/patches/CVE-2021-3450-1.patch: do not override error return
value by check_curve in crypto/x509/x509_vfy.c,
test/verify_extra_test.c.
- debian/patches/CVE-2021-3450-2.patch: fix return code check in
crypto/x509/x509_vfy.c.
- CVE-2021-3450
* No-change upload to pick up lto.
* Merge from Debian unstable. Remaining changes:
- Replace duplicate files in the doc directory with symlinks.
- debian/libssl1.1.postinst:
+ Display a system restart required notification on libssl1.1
upgrade on servers, unless needrestart is available.
+ Use a different priority for libssl1.1/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
+ Skip services restart & reboot notification if needrestart is in-use.
+ Bump version check to to 1.1.1.
+ Import libraries/restart-without-asking template as used by above.
- Revert "Enable system default config to enforce TLS1.2 as a
minimum" & "Increase default security level from 1 to 2".
- Reword the NEWS entry, as applicable on Ubuntu.
- Cherrypick s390x SIMD acceleration patches for poly1305 and chacha20
and ECC from master.
- Use perl:native in the autopkgtest for installability on i386.
- Set OPENSSL_TLS_SECURITY_LEVEL=2 as compiled-in minimum security
level. Change meaning of SECURITY_LEVEL=2 to prohibit TLS versions
below 1.2 and update documentation. Previous default of 1, can be set
by calling SSL_CTX_set_security_level(), SSL_set_security_level() or
using ':@SECLEVEL=1' CipherString value in openssl.cfg.
- Import https://github.com/openssl/openssl/pull/12272.patch to enable
CET.
* Add support for building with noudeb build profile.
* New upstream version.
- CVE-2021-23841 (NULL pointer deref in X509_issuer_and_serial_hash()).
- CVE-2021-23840 (Possible overflow of the output length argument in
EVP_CipherUpdate(), EVP_EncryptUpdate() and EVP_DecryptUpdate()).
* No-change rebuild to drop the udeb package.
* Merge from Debian unstable. Remaining changes:
- Replace duplicate files in the doc directory with symlinks.
- debian/libssl1.1.postinst:
+ Display a system restart required notification on libssl1.1
upgrade on servers, unless needrestart is available.
+ Use a different priority for libssl1.1/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
+ Skip services restart & reboot notification if needrestart is in-use.
+ Bump version check to to 1.1.1.
+ Import libraries/restart-without-asking template as used by above.
- Revert "Enable system default config to enforce TLS1.2 as a
minimum" & "Increase default security level from 1 to 2".
- Reword the NEWS entry, as applicable on Ubuntu.
- Cherrypick s390x SIMD acceleration patches for poly1305 and chacha20
and ECC from master.
- Use perl:native in the autopkgtest for installability on i386.
- Set OPENSSL_TLS_SECURITY_LEVEL=2 as compiled-in minimum security
level. Change meaning of SECURITY_LEVEL=2 to prohibit TLS versions
below 1.2 and update documentation. Previous default of 1, can be set
by calling SSL_CTX_set_security_level(), SSL_set_security_level() or
using ':@SECLEVEL=1' CipherString value in openssl.cfg.
- Import https://github.com/openssl/openssl/pull/12272.patch to enable
CET.
* Drop many patches included upstream.
* Cherry-pick a patch from upstream to address #13931.
* Enable LFS. Thanks to Dan Nicholson for debugging (Closes: #923479).
* Apply two patches from upstream to address x509 related regressions.
* New upstream version.
- CVE-2020-1971 (EDIPARTYNAME NULL pointer de-reference).
- Restore rejection of expired trusted (root) certificate
(Closes: #976465).
* New upstream version
* Disable CAPI engine, it is designed for Windows.
* New upstream version
- CVE-2020-1967 (Segmentation fault in SSL_check_chain).
* SECURITY UPDATE: EDIPARTYNAME NULL pointer de-ref
- debian/patches/CVE-2020-1971-1.patch: use explicit tagging for
DirectoryString in crypto/x509v3/v3_genn.c.
- debian/patches/CVE-2020-1971-2.patch: correctly compare EdiPartyName
in crypto/x509v3/v3_genn.c.
- debian/patches/CVE-2020-1971-3.patch: check that multi-strings/CHOICE
types don't use implicit tagging in crypto/asn1/asn1_err.c,
crypto/asn1/tasn_dec.c, crypto/err/openssl.txt,
include/openssl/asn1err.h.
- debian/patches/CVE-2020-1971-4.patch: complain if we are attempting
to encode with an invalid ASN.1 template in crypto/asn1/asn1_err.c,
crypto/asn1/tasn_enc.c, crypto/err/openssl.txt,
include/openssl/asn1err.h.
- debian/patches/CVE-2020-1971-5.patch: add a test for GENERAL_NAME_cmp
in test/v3nametest.c.
- debian/patches/CVE-2020-1971-6.patch: add a test for
encoding/decoding using an invalid ASN.1 Template in
test/asn1_decode_test.c, test/asn1_encode_test.c.
- CVE-2020-1971
* Cherrypick upstream fix for non-interactive detection on Linux. LP:
#1879826
* Cherrypick AES CTR-DRGB: performance improvement LP: #1799928
* Skip services restart & reboot notification if needrestart is in-use
LP: #1895708
* Import https://github.com/openssl/openssl/pull/12272.patch to enable
CET.
* SECURITY UPDATE: Segmentation fault in SSL_check_chain
- debian/patches/CVE-2020-1967-1.patch: add test for CVE-2020-1967 in
test/recipes/70-test_sslsigalgs.t.
- debian/patches/CVE-2020-1967-2.patch: fix NULL dereference in
SSL_check_chain() for TLS 1.3 in ssl/t1_lib.c.
- debian/patches/CVE-2020-1967-3.patch: fix test in
test/recipes/70-test_sslsigalgs.t.
- debian/patches/CVE-2020-1967-4.patch: fix test in
test/recipes/70-test_sslsigalgs.t.
- CVE-2020-1967
* Merge from Debian unstable. Remaining changes:
- Replace duplicate files in the doc directory with symlinks.
- debian/libssl1.1.postinst:
+ Display a system restart required notification on libssl1.1
upgrade on servers.
+ Use a different priority for libssl1.1/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
+ Bump version check to to 1.1.1.
+ Import libraries/restart-without-asking template as used by above.
- Revert "Enable system default config to enforce TLS1.2 as a
minimum" & "Increase default security level from 1 to 2".
- Reword the NEWS entry, as applicable on Ubuntu.
- Cherrypick s390x SIMD acceleration patches for poly1305 and chacha20
and ECC from master.
- Use perl:native in the autopkgtest for installability on i386.
- Set OPENSSL_TLS_SECURITY_LEVEL=2 as compiled-in minimum security
level. Change meaning of SECURITY_LEVEL=2 to prohibit TLS versions
below 1.2 and update documentation. Previous default of 1, can be set
by calling SSL_CTX_set_security_level(), SSL_set_security_level() or
using ':@SECLEVEL=1' CipherString value in openssl.cfg.
* New upstream version
- Revert the change of EOF detection to avoid regressions in applications.
(Closes: #955442).
* Use dh-compat level 12.
* New upstream version
- CVE-2019-1551 (Overflow in the x64_64 Montgomery squaring procedure),
(Closes: #947949).
* Update symbol list.
* Update Standards-Version to 4.5.0. No changes required.
* Add musl configurations (Closes: #941765).
* Revert version number change to 1.1.1e-dev.
* Apply 1_1_1-stable branch patches
* Apply s390x ECC assembly pack improvements
* Use perl:native in the autopkgtest for installability on i386.
* Merge from Debian unstable. Remaining changes:
- Replace duplicate files in the doc directory with symlinks.
- debian/libssl1.1.postinst:
+ Display a system restart required notification on libssl1.1
upgrade on servers.
+ Use a different priority for libssl1.1/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
+ Bump version check to to 1.1.1.
+ Import libraries/restart-without-asking template as used by above.
- Revert "Enable system default config to enforce TLS1.2 as a
minimum" & "Increase default security level from 1 to 2".
- Reword the NEWS entry, as applicable on Ubuntu.
- Cherrypick s390x SIMD acceleration patches for poly1305 and chacha20
from master.
* Set OPENSSL_TLS_SECURITY_LEVEL=2 as compiled-in minimum security
level. Change meaning of SECURITY_LEVEL=2 to prohibit TLS versions
below 1.2 and update documentation. Previous default of 1, can be set
by calling SSL_CTX_set_security_level(), SSL_set_security_level() or
using ':@SECLEVEL=1' CipherString value in openssl.cfg.
* Reenable AES-CBC-HMAC-SHA ciphers (Closes: #941987).
* New upstream version
- CVE-2019-1549 (Fixed a fork protection issue).
- CVE-2019-1547 (Compute ECC cofactors if not provided during EC_GROUP
construction).
- CVE-2019-1563 (Fixed a padding oracle in PKCS7_dataDecode and
CMS_decrypt_set1_pkey).
* Update symbol list
* Cherrypick s390x SIMD acceleration patches for poly1305 and chacha20
from master. LP: #1736705 LP: #1736704
* Import libraries/restart-without-asking as used in postinst, to
prevent failure to configure the package without debconf database. LP:
#1832919
* Bump major version of OpenSSL in postinst to trigger services restart
upon upgrade. Many services listed there must be restarted when
upgrading 1.1.0 to 1.1.1. LP: #1832522
* Fix path to Xorg for reboot notifications on desktop. LP: #1832421
* Merge from Debian unstable. Remaining changes:
- Replace duplicate files in the doc directory with symlinks.
- debian/libssl1.1.postinst:
+ Display a system restart required notification on libssl1.1
upgrade on servers.
+ Use a different priority for libssl1.1/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- Revert "Enable system default config to enforce TLS1.2 as a
minimum" & "Increase default security level from 1 to 2".
- Drop the NEWS entry, not applicable on Ubuntu.
* Cherrypick upstream patch to fix ca -spkac output to be text again
LP: #1828215
* New upstream version
- CVE-2019-1543 (Prevent over long nonces in ChaCha20-Poly1305)
* Update symbol list
* Merge from Debian unstable, remaining changes:
- Replace duplicate files in the doc directory with symlinks.
- debian/libssl1.1.postinst:
+ Display a system restart required notification on libssl1.1
upgrade on servers.
+ Use a different priority for libssl1.1/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- Revert "Enable system default config to enforce TLS1.2 as a
minimum" & "Increase default security level from 1 to 2".
- Drop the NEWS entry, not applicable on Ubuntu.
* Fix BUF_MEM regression (Closes: #923516)
* Fix error when config can't be opened (Closes: #926315)
* Ship an openssl.cnf in libssl1.1-udeb.dirs
* debian/rules: Ship openssl.cnf in libssl1.1-udeb, as required to use
OpenSSL by other udebs, e.g. wget-udeb. LP: #1822898
* Drop debian/patches/UBUNTU-lower-tls-security-level-for-compat.patch
to revert TLS_SECURITY_LEVEL back to 1. LP: #1822984
* Merge from Debian unstable, remaining changes:
- Replace duplicate files in the doc directory with symlinks.
- debian/libssl1.1.postinst:
+ Display a system restart required notification on libssl1.1
upgrade on servers.
+ Use a different priority for libssl1.1/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- Revert "Enable system default config to enforce TLS1.2 as a
minimum" & "Increase default security level from 1 to 2".
- Further decrease security level from 1 to 0, for compatibility with
openssl 1.0.2.
- Drop the NEWS entry, not applicable on Ubuntu.
[ Sebastian Andrzej Siewior ]
* Add Breaks on lighttpd (Closes: #913558).
[ Kurt Roeckx ]
* New upstream version
* Update symbol list
* Drop the NEWS entry, not applicable on Ubuntu.
* Merge from Debian unstable, remaining changes:
- Replace duplicate files in the doc directory with symlinks.
- debian/libssl1.1.postinst:
+ Display a system restart required notification on libssl1.1
upgrade on servers.
+ Use a different priority for libssl1.1/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- Revert "Enable system default config to enforce TLS1.2 as a
minimum" & "Increase default security level from 1 to 2".
- Further decrease security level from 1 to 0, for compatibility with
openssl 1.0.2.
* Add Breaks on python-boto (See: #909545)
* New upstream version
- CVE-2018-0734 (Timing vulnerability in DSA signature generation)
- CVE-2018-0735 (Timing vulnerability in ECDSA signature generation)
- Update symbol file for 1.1.1a
[ Sebastian Andrzej Siewior ]
* Add Breaks on isync (See: #906955)
* Fix autopkgtest (Closes: #910459)
[ Kurt Roeckx ]
* Add Breaks on python-imaplib2 (See: #907079)
* Add news entry regarding default TLS version and security level
(Closes: #875423, #907631, #911389, #912067).
* Fixup typpos in the autopkgtest binary name.
* Merge from Debian unstable, remaining changes:
- Replace duplicate files in the doc directory with symlinks.
- debian/libssl1.1.postinst:
+ Display a system restart required notification on libssl1.1
upgrade on servers.
+ Use a different priority for libssl1.1/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- Revert "Enable system default config to enforce TLS1.2 as a
minimum" & "Increase default security level from 1 to 2".
- Further decrease security level from 1 to 0, for compatibility with
openssl 1.0.2.
* New upstream version.
- Update symbol file for 1.1.1
- CVE-2018-0732 (actually since pre8).
* Add Breaks on python-httplib2 (See: #907278)
* Add hardening=+all.
* Update to policy 4.2.1
- Less verbose testsuite with terse
- Use RRR=no
* New upstream version.
- Support the final TLS 1.3 version (RFC 8446)
* Upload to unstable
* New upstream version.
* Drop afalgeng on kfreebsd-* which go enabled because they inherit from
the linux target.
* Fix debian-rules-sets-dpkg-architecture-variable.
* Update to policy 4.1.4
- only Suggest: libssl-doc instead Recommends (only documentation and
example code is shipped).
- drop Priority: important.
- use signing-key.asc and a https links for downloads
* Use compat 11.
- this moves the examples to /usr/share/doc/libssl-{doc->dev}/demos but it
seems to make sense.
* Add a 25-test_verify.t for autopkgtest which runs against intalled
openssl binary.
* Fix CVE-2018-0737 (Closes: #895844).
* Update libssl1.1.symbols
* New upstream version
* Increase default security level from 1 to 2. This moves from the 80 bit
security level to the 112 bit securit level and will require 2048 bit RSA
and DHE keys.
* Update to 1.1.1-pre4 (Closes: #892276, #894282).
* Add riscv64 target (Closes: #891797).
* Update to 1.1.1-pre3
* Don't suggest 1024 bit RSA key to be typical (Closes: #878303).
* Don't insist on TLS1.3 cipher for <TLS1.3 connections (Closes: #891570).
* Enable system default config to enforce TLS1.2 as a minimum.
* Update to 1.1.1-pre2
* Abort the build if symbols are discovered which are not part of the
symbols file.
* Add config support for MIPS R6, patch by YunQiang Su (Closes: #882007).
* Enable afalgeng on Linux targets (Closes: #888305)
* Update 1.1.1-pre1.
* Avoid problems with aes assembler on armhf using binutils 2.29
[ Kurt Roeckx ]
* New upstream version
- Fixes CVE-2017-3735
- Fixes CVE-2017-3736
* Remove patches applied upstream
* Temporary enable TLS 1.0 and 1.1 again (#875423)
* Attempt to fix testsuite race condition
* update no-symbolic.patch to apply
* Instead of completly disabling TLS 1.0 and 1.1, just set the minimum
version to TLS 1.2 by default. TLS 1.0 and 1.1 can be enabled again by
calling SSL_CTX_set_min_proto_version() or SSL_set_min_proto_version().
[ Sebastian Andrzej Siewior ]
* Add support for arm64ilp32, patch by Wookey (Closes: #867240)
[ Kurt Roeckx ]
* Disable TLS 1.0 and 1.1, leaving 1.2 as the only supported SSL/TLS
version. This will likely break things, but the hope is that by
the release of Buster everything will speak at least TLS 1.2. This will be
reconsidered before the Buster release.
* Fix a race condition in the test suite (Closes: #869856)
* Don't cleanup a thread-local key we didn't create it (Closes: #863707)
* Make the udeb use a versioned depends (Closes: #864080)
* Conflict with libssl1.0-dev (Closes: #863367)
* New upstream version
- Fix regression in req -x509 (Closes: #839575)
- Properly detect features on the AMD Ryzen processor (Closes: #861145)
- Don't mention -tls1_3 in the manpage (Closes: #859191)
* Update libssl1.1.symbols for new symbols
* Update man-section.patch
* Make openssl depend on perl-base (Closes: #860254)
* New upstream version
- Fixes CVE-2017-3733
- Remove patches that are applied upstream.
* Fix building of arch and all packages in a minimal environment
(Closes: #852900).
* Fix precomputing SHA1 by adding the following patches from upstream:
- Add-a-couple-of-test-to-check-CRL-fingerprint.patch
- Document-what-EXFLAG_SET-is-for-in-x509v3.h.patch
- X509_CRL_digest-ensure-precomputed-sha1-hash-before-.patch
(Closes: #852920).
* New Upstream release
- Fixes CVE-2017-3731
- Fixes CVE-2017-3730
- Fixes CVE-2017-3732
- drop revert_ssl_read.patch and
0001-Add-missing-zdelete-for-some-linux-arches.patch, applied upstream.
* add new symbols.
* Make build-indep build again.
* Don't depend on perl:any in openssl as it breaks debootstrap
("Closes: #852017).
* Add myself as Uploader.
* Add support for tilegx, patch by Helmut Grohne (Closes: #848957).
* redo the rules file to some newer debhelper:
- everyfile should remain, nothing should get lost
- the scripts in the doc package gained an exec bit
- openssl gained a dep on perl (the package contains perl scripts)
- libssl1.0.2-dbg is gone, we have dbgsym now
- dh compat 10
- pkg.install instead of pkg.files is used for install
* Mark libssl-doc as MA foreign
* Update Standards-Version from 3.9.5 to 3.9.8. No changes required.
* Document the change for openssl's enc command between 1.1.0 and pre 1.1.0
in the NEWS file (Closes: #843064).
* Add an override for lintian for the non-standard private directory
* Revert behaviour of SSL_read() and SSL_write(), and update documentation.
(Closes: #844234)
* Add missing -zdelete on x32 (Closes: #844715)
* Add a Breaks on salt-common. Addresses #844706
* New upstrem release
- Fix CVE-2016-7053
- Fix CVE-2016-7054
- Fix CVE-2016-7055
* remove no-rpath.patch, applied upstream.
* Remove old d2i test cases, use the one from the upstream tarball.
* Update libssl1.1.symbols for new sysmbols.
* Upload to unstable
* New upstream release
- Fixes CVE-2016-6309
* New upstream release
- Fix CVE-2016-6304
- Fix CVE-2016-6305
- Fix CVE-2016-6307
- Fix CVE-2016-6308
* Update c_rehash-compat.patch to apply to new version.
* Update symbol file.
[ Kurt Roeckx ]
* New upstream version
* Use Package-Type instead of XC-Package-Type
* Remove "Priority: optional" in the binary packages.
* Add Homepage
* Use dpkg-buildflags's LDFLAGS also for building the shared libraries.
[ Sebastian Andrzej Siewior ]
* drop config-hurd.patch, we don't use `config' and it works without the
patch.
* Drop depend on zlib1g-dev since we don't use it anymore (Closes: #767207)
* Make the openssl package Multi-Arch: foregin (Closes: #827028)
[ Sebastian Andrzej Siewior ]
* drop engines-path.patch. Upstream uses a 1.1 suffixes now.
[ Kurt Roeckx ]
* New upstream version
* Drop upstream snapshot
* Update symbols file
* Use some https instead of http URLs
* Update snapshot to commit fe964f0c88f6780fd30b26e306484b981b0a8480
* Update snapshot to commit c32bdbf171ce6650ef045ec47b5abe0de7c264db
* Remove utils-mkdir-p-check-if-dir-exists-also-after-mkdir-f.patch, applied
upstream
[ Kurt Roeckx ]
* Don't use assembler on hppa, it's not writen for Linux.
[ Sebastian Andrzej Siewior ]
* Run the testsuite with verbose output.
* Use $(MAKE) so the whole make environment is passed to its child and we
can build in parallel with -jX
* Update snapshot to commit 5000a6d1215e ("Fix an error path leak in int
X509_ATTRIBUTE_set1_data()")
* New upstream version with soname change. Upload to experimental.
- Rename binary packages
- Remove patches:
- block_diginotar.patch: All cross certificates expired in 2013
- block_digicert_malaysia.patch: intermediate certificates expired in
2015
- man-dir.patch: Fixed upstream
- valgrind.patch: Upstream no longer adds the uninitialized data to the
RNG
- shared-lib-ext.patch: No longer needed
- version-script.patch: Upstream does symbol versioning itself now
- disable_freelist.patch: No longer needed
- soname.patch: Was to change to the 1.0.2 soname that upstream never had
- disable_sslv3_test.patch: Fixed upstream
- libdoc-manpgs-pod-spell.patch: Fixed upstream (Closes: #813191)
- Rewrite debian-targets.patch to work with the new configuration system.
- Update other patches to apply
- Update list of install docs
- Use DESTDIR instead of INSTALL_PREFIX
- Clean up more files
- Remove the configure option enable-tlsext no-ssl2 since they're no
longer supported.
* Add upstream snapshot:
- Add d2i-tests.tar to get new binary test files.
* Don't build i686 optimized version anymore on i386, it's now the default.
(Closes: #823774)
* New upstream version
- Fixes CVE-2016-2107
- Fixes CVE-2016-2105
- Fixes CVE-2016-2106
- Fixes CVE-2016-2109
- Fixes CVE-2016-2176
* Use assembler of arm64 (Closes: #794326)
Patch from Riku Voipio <riku.voipio@iki.fi>
* Add a udeb for libssl, based on similar changes done in Ubuntu
starting in version 0.9.8o-4ubuntu1 (Closes: #802591)
Patch from Margarita Manterola <marga@google.com>
* Add support for nios2 (Closes: #816239)
Based on patch from Marek Vasut <marex@denx.de>
* Update Spanish translation from Manuel "Venturi" Porras Peralta
<venturi@openmailbox.org> (Closes: #773601)
* Don't build an i586 optimized version anymore, the default
already targets that. Patch from Sven Joachim <svenjoac@gmx.de>
(Closes: #759811)
* New upstream version
* Fix CVE-2016-0797
* Fix CVE-2016-0798
* Fix CVE-2016-0799
* Fix CVE-2016-0702
* Fix CVE-2016-0705
* Disable EXPORT and LOW ciphers: The DROWN attack (CVE-2016-0800)
makes use of those, and SLOTH attack (CVE-2015-7575) can make use of them
too.
* New upstream version.
- Fixes CVE-2016-0701
- Not affected by CVE-2015-3197 because SSLv2 is disabled.
* New upstream release
- Fix CVE-2015-3193
- Fix CVE-2015-3194
- Fix CVE-2015-3195
- Fix CVE-2015-3196
* Remove all symlinks during clean
* Run make depend after configure
* Remove openssl_button.* from the doc package
* Upload to unstable
* Build with no-ssl3-method to remove all SSLv3 support. This results in
the functions SSLv3_method(), SSLv3_server_method() and
SSLv3_client_method() being removed from libssl. Change the soname as
result of that and also changes name of the binary package.
(Closes: #768476)
* Enable rfc3779 and cms support (Closes: #630790)
* Fix cross compilation for mips architectures. (Closes: #782492)
* New upstream version
- Fixes CVE-2015-1793
* New upstream version
- Fixes ABI (Closes: #788511)
* New upstream version
- Fix CVE-2015-4000
- Fix CVE-2015-1788
- Fix CVE-2015-1789
- Fix CVE-2015-1790
- Fix CVE-2015-1792
- Fix CVE-2015-1791
* Update c_rehash-compat.patch to make it apply to the new version.
* Remove openssl-pod-misspell.patch applied upstream
* New upstrema version
- Fix CVE-2015-0286
- Fix CVE-2015-0287
- Fix CVE-2015-0289
- Fix CVE-2015-0293 (not affected, SSLv2 disabled)
- Fix CVE-2015-0209
- Fix CVE-2015-0288
- Fix CVE-2015-0291
- Fix CVE-2015-0290
- Fix CVE-2015-0207
- Fix CVE-2015-0208
- Fix CVE-2015-1787
- Fix CVE-2015-0285
* Temporary enable SSLv3 methods again, but they will go away.
* Don't set TERMIO anymore, use the default TERMIOS instead.
* New upstream release
- Fixes CVE-2014-3571
- Fixes CVE-2015-0206
- Fixes CVE-2014-3569
- Fixes CVE-2014-3572
- Fixes CVE-2015-0204
- Fixes CVE-2015-0205
- Fixes CVE-2014-8275
- Fixes CVE-2014-3570
- Drop git_snapshot.patch
* Drop gnu_source.patch, dgst_hmac.patch, stddef.patch,
no_ssl3_method.patch: applied upstream
* Update patches to apply
* New usptream beta version
* Add git snapshot
* Merge changes between 1.0.1h-3 and 1.0.1j-1:
- Disables SSLv3 because of CVE-2014-3566
* Drop patch rehash-crt.patch: partially applied upstream.
c_rehash now doesn't support files in DER format anymore.
* Drop patch rehash_pod.patch: applied upstream
* Update c_rehash-compat.patch to apply to new upstream version. This
undoes upstream's "-old" option and creates both the new and old again.
It now also does it for CRLs.
* Drop defaults.patch, applied upstream
* dgst_hmac.patch updated to apply to upstream version.
* engines-path.patch updated to apply to upstream version.
* Update list of exported symbols
* Update symbols files to require beta3
* Enable unit tests
* Add patch to add support for the no-ssl3-method option that completly
disable SSLv3 and pass the option. This drops the following functions
from the library: SSLv3_method, SSLv3_server_method and
SSLv3_client_method
* Build using OPENSSL_NO_BUF_FREELISTS
* New usptream beta version
- Fix CVE-2014-0224
- Fix CVE-2014-0221
- Fix CVE-2014-0195
- Fix CVE-2014-3470
- Fix CVE-2014-0198
- Fix CVE-2010-5298
- Fix CVE-2014-0160
- Fix CVE-2014-0076
* Merge changes between 1.0.1f-1 and 1.0.1h-3:
- postinst: Updated check for restarting services
* libdoc-manpgs-pod-spell.patch and openssl-pod-misspell.patch
partially applied upstream
* Drop fix-pod-errors.patch, applied upstream.
* Add support for ppc64le (Closes: #745657)
* Add support for OpenRISC (Closes: #736772)
* New upstream beta version
- Update list of symbols that should be exported and adjust the symbols
file. This also removes a bunch of duplicate symbols in the linker
file.
- Fix additional pod errors
- Following patches have been applied upstream and are removed:
libssl-misspell.patch, pod_req_misspell2.patch,
pod_pksc12.misspell.patch, pod_s_server.misspell.patch,
pod_x509setflags.misspell.patch, pod_ec.misspell.patch,
pkcs12-doc.patch, req_bits.patch
- Following patches have been partially applied upstream:
libdoc-manpgs-pod-spell.patch, openssl-pod-misspell.patch
- Remove openssl_fix_for_x32.patch, different patch applied upstream.
* Add support for cross compiling (Closes: #465248)
* New upstream version
- Fix for TLS record tampering bug CVE-2013-4353
- Drop the snapshot patch
* update watch file to check for upstream signature and add upstream pgp key.
* Drop conflicts against openssh since we now on a released version again.
* Add Breaks: openssh-client (<< 1:6.4p1-1.1), openssh-server (<<
1:6.4p1-1.1). This is to prevent people running into #732940.
This Breaks can be removed again when we stop using a git snapshot.
* Change default digest to SHA256 instead of SHA1. (Closes: #694738)
* Drop support for multiple certificates in 1 file. It never worked
properly in the first place, and the only one shipping in
ca-certificates has been split.
* Fix libdoc-manpgs-pod-spell.patch to only fix spalling errors
* Remove make-targets.patch. It prevented the test dir from being cleaned.
* Update to a git snapshot of the OpenSSL_1_0_1-stable branch.
- Fixes CVE-2013-6449 (Closes: #732754)
- Fixes CVE-2013-6450
- Drop patches ssltest_no_sslv2.patch cpuid.patch aesni-mac.patch
dtls_version.patch get_certificate.patch, since they where all
already commited upstream.
- adjust fix-pod-errors.patch for the reordering of items in the
documentation they've done trying to fix those pod errors.
- disable rdrand engine by default (Closes: #732710)
* disable zlib support. Fixes CVE-2012-4929 (Closes: #728055)
* Add arm64 support (Closes: #732348)
* Properly use the default number of bits in req when none are given
[ Peter Michael Green ]
* Fix pod errors (Closes: #723954)
* Fix clean target
[ Kurt Roeckx ]
* Add mipsn32 and mips64 targets. Patch from Eleanor Chen
<chenyueg@gmail.com> (Closes: #720654)
* Add support for nocheck in DEB_BUILD_OPTIONS
* Update Norwegian translation (Closes: #653574)
* Update description of the packages. Patch by Justin B Rye
(Closes: #719262)
* change to debhelper compat level 9:
- change dh_strip call so only the files from libssl1.0.0 get debug
symbols.
- change dh_makeshlibs call so the engines don't get added to the
shlibs
* Update Standards-Version from 3.8.0 to 3.9.5. No changes required.
* Move <openssl/opensslconf.h> to /usr/include/$(DEB_HOST_MULTIARCH), and
mark libssl-dev Multi-Arch: same.
Patch by Colin Watson <cjwatson@ubuntu.com> (Closes: #689093)
* Add Polish translation (Closes: #658162)
* Add Turkish translation (Closes: #660971)
* Enable assembler for the arm targets, and remove armeb.
Patch by Riku Voipio <riku.voipio@iki.fi> (Closes: #676533)
* Add support for x32 (Closes: #698406)
* enable ec_nistp_64_gcc_128 on *-amd64 (Closes: #698447)
* Bump shlibs. It's needed for the udeb.
* Make cpuid work on cpu's that don't set ecx (Closes: #699692)
* Fix problem with AES-NI causing bad record mac (Closes: #701868, #702635, #678353)
* Fix problem with DTLS version check (Closes: #701826)
* Fix segfault in SSL_get_certificate (Closes: #703031)
* New upstream version (Closes: #699889)
- Fixes CVE-2013-0169, CVE-2012-2686, CVE-2013-0166
- Drop renegiotate_tls.patch, applied upstream
- Export new CRYPTO_memcmp symbol, update symbol file
* Add ssltest_no_sslv2.patch so that "make test" works.
* Re-enable assembler versions on sparc. They shouldn't have
been disabled for sparc v9. (Closes: #649841)
* Fix the configure rules for alpha (Closes: #672710)
* Switch the postinst to sh again, there never was a reason to
switch it to bash (Closes: #676398)
* Fix pic.patch to not use #ifdef in x86cpuid.s, only .S files are
preprocessed. We generate the file again for pic anyway.
(Closes: #677468)
* Drop Breaks against openssh as it was only for upgrades
between versions that were only in testing/unstable.
(Closes: #668600)
* Disable padlock engine again, causes problems for hosts not supporting it.
* Fix renegiotation when using TLS > 1.0. This breaks tor. Patch from
upstream. (Closes: #675990)
* Enable the padlock engine by default.
* Change default bits from 1024 to 2048 (Closes: #487152)
* New upstream version
- Fixes CVE-2012-2333 (Closes: #672452)
* New upstream version
- Remaps SSL_OP_NO_TLSv1_1, so applications linked to 1.0.0
can talk to servers supporting TLS 1.1 but not TLS 1.2
- Drop rc4_hmac_md5.patch, applied upstream
* Use patch from upstream for the rc4_hmac_md5 issue.
* Fix rc4_hmac_md5 on non-i386/amd64 arches.
* New upstream version
- Fixes CVE-2012-2110
- Fix crash in rc4_hmac_md5 (Closes: #666405)
- Fixes some issues with talking to other servers when TLS 1.1 and 1.2 is
supported
- Drop patches no_ssl2.patch vpaes.patch tls1.2_client_algorithms.patch,
applied upstream.
* Use official patch for the vpaes problem, also covering amd64.
* Fix crash in vpaes (Closes: #665836)
* use client version when deciding whether to send supported signature
algorithms extension
* Properly quote the new cflags in Configure
* New upstream version
- Remove kfreebsd-pipe.patch, fixed upstream
- Update pic.patch, openssl-pod-misspell.patch and make-targets.patch
- Add OPENSSL_1.0.1 to version-script.patch and libssl1.0.0.symbols for
the new functions.
- AES-NI support (Closes: #644743)
* pic.patch: upstream made OPENSSL_ia32cap_P and OPENSSL_cpuid_setup
hidden on amd64, no need to access it PIC anymore.
* pic.patch: Make OPENSSL_ia32cap_P hidden on i386 too (Closes: #663977)
* Enable hardening using dpkg-buildflags (Closes: #653495)
* s_client and s_server were forcing SSLv3 only connection when SSLv2 was
disabled instead of the SSLv2 with upgrade method. (Closes: #664454)
* Add Breaks on openssh < 1:5.9p1-4, it has a too strict version check.
* New upstream version
- Fixes CVE-2012-0884
- Fixes CVE-2012-1165
- Properly fix CVE-2011-4619
- pkg-config.patch applied upstream, remove it.
* Enable assembler for all i386 arches. The assembler does proper
detection of CPU support, including cpuid support.
This should fix a problem with AES 192 and 256 with the padlock
engine because of the difference in NO_ASM between the between
the i686 optimized library and the engine.
* New upstream version
- Fixes CVE-2012-0050
* New upstream version
- Fixes CVE-2011-4108, CVE-2011-4576, CVE-2011-4619, CVE-2012-0027,
CVE-2011-4577
* Don't build v8 and v9 variants of sparc anymore, they're older than
the default. (Closes: #649841)
* Don't build i486 optimized version, that's the default anyway, and
it uses assembler that doesn't always work on i486.
* Non-maintainer upload by the Security Team.
* Block Malaysian's Digicert Sdn. Bhd. certificates by marking them
as revoked.
* Add a missing $(DEB_HOST_MULTIARCH)
* New upstream version
- Fix bug where CRLs with nextUpdate in the past are sometimes accepted
by initialising X509_STORE_CTX properly. (CVE-2011-3207)
- Fix SSL memory handling for (EC)DH ciphersuites, in particular
for multi-threaded use of ECDH. (CVE-2011-3210)
- Add protection against ECDSA timing attacks (CVE-2011-1945)
* Block DigiNotar certifiates. Patch from
Raphael Geissert <geissert@debian.org>
* Generate hashes for all certs in a file (Closes: #628780, #594524)
Patch from Klaus Ethgen <Klaus@Ethgen.de>
* Add multiarch support (Closs: #638137)
Patch from Steve Langasek / Ubuntu
* Symbols from the gost engine were removed because it didn't have
a linker file. Thanks to Roman I Khimov <khimov@altell.ru>
(Closes: #631503)
* Add support for s390x. Patch from Aurelien Jarno <aurel32@debian.org>
(Closes: #641100)
* Add build-arch and build-indep targets to the rules file.
* Make it build on sparc64. Patch from Aurelien Jarno. (Closes: #626060)
* Apply patches from Scott Schaefer <saschaefer@neurodiverse.org> to
fix various pod and spelling errors. (Closes: #622820, #605561)
* Add missing symbols for the engines (Closes: #623038)
* More spelling fixes from Scott Schaefer (Closes: #395424)
* Patch from Scott Schaefer to better document pkcs12 password options
(Closes: #462489)
* Document dgst -hmac option. Patch by Thorsten Glaser <tg@mirbsd.de>
(Closes: #529586)
* Make c_rehash also generate the old subject hash. Gnutls applications
seem to require it. (Closes: #611102)
* New upstream version
- Fixes CVE-2011-0014
* Make libssl-doc Replaces/Breaks with old libssl-dev packages
(Closes: #607609)
* Only export the symbols we should, instead of all.
* Add symbol file.
* Upload to unstable
* Set $ in front of {sparcv9_asm} so that the sparc v9 variant builds.
* Always define _GNU_SOURCE, not only for Linux.
* Drop SSL2 support (Closes: #589706)
* New upstream version (Closes: #578376)
- New soname: Rename library packages
- Drop patch perl-path.diff, not needed anymore
- Drop patches CVE-2010-2939.patch, CVE-2010-3864.patch
and CVE-2010-4180.patch: applied upstream.
- Update Configure for the new fields for the assembler options
per arch. alpha now makes use of assembler.
* Move man3 manpages and demos to libssl-doc (Closes: #470594)
* Drop .pod files from openssl package (Closes: #518167)
* Don't use RC4_CHAR on amd64 and drop rc4-amd64.patch
* Stop using BF_PTR2 on (kfreebd-)amd64.
* Drop debian-arm from the list of arches.
* Update arm arches to use BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL
BF_PTR instead of BN_LLONG DES_RISC1
* ia64: Drop RC4_CHAR, add DES_UNROLL DES_INT
* powerpc: Use RC4_CHAR RC4_CHUNK DES_RISC1 instead
of DES_RISC2 DES_PTR MD2_CHAR RC4_INDEX
* s390: Use RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL instead of BN_LLONG
* Fix CVE-2010-4180 (Closes: #529221)
* Fix TLS extension parsing race condition (CVE-2010-3864) (Closes: #603709)
* Re-add the engines. They were missing since 0.9.8m-1.
Patch by Joerg Schneider. (Closes: #603693)
* Not all architectures were build using -g (Closes: #570702)
* Add powerpcspe support (Closes: #579805)
* Add armhf support (Closes: #596881)
* Update translations:
- Brazilian Portuguese (Closes: #592154)
- Danish (Closes: #599459)
- Vietnamese (Closes: #601536)
- Arabic (Closes: #596166)
* Generate the proper stamp file so that everything doesn't get build twice.
* Fix CVE-2010-2939: Double free using ECDH. (Closes: #594415)
* New upstream version
- Add SHA2 algorithms to SSL_library_init().
- aes-x86_64.pl is now PIC, update pic.patch.
* Add sparc64 support (Closes: #560240)
* New upstream version.
- Fixes CVE-2010-0740.
- Drop cfb.patch, applied upstream.
* Revert CFB block length change preventing reading older files.
(Closes: #571810, #571940)
* New upstream version
- Implements RFC5746, reenables renegotiation but requires the extension.
- Fixes CVE-2009-3245
- Drop patches CVE-2009-4355.patch, CVE-2009-1378.patch,
CVE-2009-1377.patch, CVE-2009-1379.patch, CVE-2009-3555.patch,
CVE-2009-2409.patch, CVE-2009-1387.patch, tls_ext_v3.patch,
no_check_self_signed.patch: applied upstream
- pk7_mime_free.patch removed, code rewritten
- ca.diff partially applied upstream
- engines-path.patch adjusted, upstream made some minor changes to the
build system.
- some flags changed values, bump shlibs.
* Switch to 3.0 (quilt) source package.
* Make sure the package is properly cleaned.
* Add ${misc:Depends} to the Depends on all packages.
* Fix spelling of extension in the changelog file.
* Clean up zlib state so that it will be reinitialized on next use and
not cause a memory leak. (CVE-2009-4355, CVE-2008-1678)
* Bump the shlibs to require 0.9.8k-1. The following symbols
to added between g and k: AES_wrap_key, AES_unwrap_key,
ASN1_TYPE_set1, ASN1_STRING_set0, asn1_output_data_fn,
SMIME_read_ASN1, BN_X931_generate_Xpq, BN_X931_derive_prime_ex,
BN_X931_generate_prime_ex, COMP_zlib_cleanup, CRYPTO_malloc_debug_init,
int_CRYPTO_set_do_dynlock_callback, CRYPTO_set_mem_info_functions,
CRYPTO_strdup, CRYPTO_dbg_push_info, CRYPTO_dbg_pop_info,
CRYPTO_dbg_remove_all_info, OPENSSL_isservice, OPENSSL_init,
ENGINE_set_load_ssl_client_cert_function,
ENGINE_get_ssl_client_cert_function, ENGINE_load_ssl_client_cert,
EVP_CIPHER_CTX_set_flags, EVP_CIPHER_CTX_clear_flags,
EVP_CIPHER_CTX_test_flags, HMAC_CTX_set_flags, OCSP_sendreq_new
OCSP_sendreq_nbio, OCSP_REQ_CTX_free, RSA_X931_derive_ex,
RSA_X931_generate_key_ex, X509_ALGOR_set0, X509_ALGOR_get0,
X509at_get0_data_by_OBJ, X509_get1_ocsp
* Disable SSL/TLS renegotiation (CVE-2009-3555) (Closes: #555829)
* Don't check self signed certificate signatures in X509_verify_cert()
(Closes: #541735)
* Split all the patches into a separate files
* Stop undefinging HZ, the issue on alpha should be fixed.
* Remove MD2 from digest algorithm table. (CVE-2009-2409) (Closes: #539899)
* Make rc4-x86_64 PIC. Based on patch from Petr Salinger (Closes: #532336)
* Add workaround for kfreebsd that can't see the different between
two pipes. Patch from Petr Salinger.
* Move libssl0.9.8-dbg to the debug section.
* Use the rc4 assembler on kfreebsd-amd64 (Closes: #532336)
* Split the line to generate md5-x86_64.s in the Makefile. This will
hopefully fix the build issue on kfreebsd that now outputs the file
to stdout instead of the file.
* Fix denial of service via an out-of-sequence DTLS handshake message
(CVE-2009-1387) (Closes: #532037)
* New upstream release
- 0.9.8i fixed denial of service via a DTLS ChangeCipherSpec packet
that occurs before ClientHello (CVE-2009-1386)
* Make aes-x86_64.pl use PIC.
* Fix security issues (Closes: #530400)
- "DTLS record buffer limitation bug." (CVE-2009-1377)
- "DTLS fragment handling" (CVE-2009-1378)
- "DTLS use after free" (CVE-2009-1379)
* Fixed Configure for hurd: use -mtune=i486 instead of -m486
Patch by Marc Dequènes (Duck) <duck@hurdfr.org> (Closes: #530459)
* Add support for avr32 (Closes: #528648)
* Properly validate the length of an encoded BMPString and UniversalString
(CVE-2009-0590) (Closes: #522002)
* Internal calls to didn't properly check for errors which
resulted in malformed DSA and ECDSA signatures being treated as
a good signature rather than as an error. (CVE-2008-5077)
* ipv6_from_asc() could write 1 byte longer than the buffer in case
the ipv6 address didn't have "::" part. (Closes: #506111)
* Don't give the warning about security updates when upgrading
from etch since it doesn't have any known security problems.
* Automaticly use engines that succesfully initialised. Patch
from the 0.9.8h upstream version. (Closes: #502177)
* Fix a problem with tlsext preventing firefox 3 from connection.
Patch from upstream CVS and part of 0.9.8h.
(Closes: #492758)
* add the changelog of the 10.1 NMU to make bugtracking happy
[ Christoph Martin ]
* updated cs, gl, sv, ru, ro debconf translation (closes: #480926, #480967,
#482465, #484324, #488595)
* add Vcs-Svn header (closes: #481654)
* fix debian-kfreebsd-i386 build flags (closes: #482275)
* add stunnel4 to restart list (closes: #482111)
* include fixes from 10.1 NMU by Security team
- Fix double free in TLS server name extension which leads to a remote
denial of service (CVE-2008-0891; Closes: #483379).
- Fix denial of service if the 'Server Key exchange message'
is omitted from a TLS handshake which could lead to a client
crash (CVE-2008-1672; Closes: #483379).
This only works if openssl is compiled with enable-tlsext which is
done in Debian.
* fix some lintian warnings
* update to newest standards version
* Non-maintainer upload by the Security team.
* Fix denial of service if the 'Server Key exchange message'
is omitted from a TLS handshake which could lead to a client
crash (CVE-2008-1672; Closes: #483379).
This only works if openssl is compiled with enable-tlsext which is
done in Debian.
* Fix double free in TLS server name extension which leads to a remote
denial of service (CVE-2008-0891; Closes: #483379).
* undefine HZ so that the code falls back to sysconf(_SC_CLK_TCK)
to fix a build failure on alpha.
[ Christoph Martin ]
* Include updated debconf translations (closes: #473477, #461597,
#461880, #462011, #465517, #475439)
[ Kurt Roeckx ]
* ssleay_rand_add() really needs to call MD_Update() for buf.
* Don't add extensions to ssl v3 connections. It breaks with some
other software. (Closes: #471681)
* Upload to unstable.
* Bump shlibs.
* Enable tlsext. This changes the ABI, but should hopefully
not cause any problems. (Closes: #462596)
* Fix aes ige test speed not to overwrite it's buffer and
cause segfauls. Thanks to Tim Hudson (Closes: #459619)
* Mark some strings in the templates as non translatable.
Patch from Christian Perrier <bubulle@debian.org> (Closes: #450418)
* Update Dutch debconf translation (Closes: #451290)
* Update French debconf translation (Closes: #451375)
* Update Catalan debconf translation (Closes: #452694)
* Update Basque debconf translation (Closes: #457285)
* Update Finnish debconf translation (Closes: #458261)
* aes-586.pl: push %ebx on the stack before we put some things on the
stack and call a function, giving AES_decrypt() wrong values to work
with. (Closes: #449200)
* Avoid text relocations on i386 caused by the assembler versions:
- x86unix.pl: Create a function_begin_B_static to create a
static/local assembler function.
- aes-586.pl: Use the function_begin_B_static for _x86_AES_decrypt
so that it doesn't get exported and doesn't have any (text) relocations.
- aes-586.pl: Set up ebx to point to the GOT and call AES_set_encrypt_key
via the PLT to avoid a relocation.
- x86unix.pl: Call the init function via the PLT, avoiding a relocation
in case of a PIC object.
- cbc.pl: Call functions via the PLT.
- desboth.pl: Call DES_encrypt2 via the PLT.
* CA.sh should use the v3_ca extension when called with -newca
(Closes: #428051)
* Use -Wa,--noexecstack for all arches in Debian. (Closes: #430583)
* Convert the failure message when services fail restart to a debconf
message.
* To restart a service, just restart, instead of stop and start.
Hopefully fixes #444946
* Also remove igetest from the test dir in the clean target.
(Closes: #424362)
* New upstream release
- Fixes version number not to say it's a development version.
* New upstream release
- Fixes DTLS issues, also fixes CVE-2007-4995 (Closes: #335703, #439737)
- Proper inclusion of opensslconf.h in pq_compat.h (Closes: #408686)
- New function SSL_set_SSL_CTX: bump shlibs.
* Remove build dependency on gcc > 4.2
* Remove the openssl preinst, it looks like a workaround
for a change in 0.9.2b where config files got moved. (Closes: #445095)
* Update debconf translations:
- Vietnamese (Closes: #426988)
- Danish (Closes: #426774)
- Slovak (Closes: #440723)
- Finnish (Closes: #444258)
* CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers().
(Closes: #444435)
* Add postgresql-8.2 to the list of services to check.
* Fix another case of the "if this code is reached, the program will abort"
(Closes: #429740)
* Temporary force to build with gcc >= 4.2
* Fix problems with gcc-4.2 (Closes: #429740)
* Stop using -Bsymbolic to create the shared library.
* Make x86_64cpuid.pl use PIC.
* Add fix for CVE-2007-3108 (Closes: #438142)
[ Christian Perrier ]
* Debconf templates proofread and slightly rewritten by
the debian-l10n-english team as part of the Smith Review Project.
Closes: #418584
* Debconf templates translations:
- Arabic. Closes: #418669
- Russian. Closes: #418670
- Galician. Closes: #418671
- Swedish. Closes: #418679
- Korean. Closes: #418755
- Czech. Closes: #418768
- Basque. Closes: #418784
- German. Closes: #418785
- Traditional Chinese. Closes: #419915
- Brazilian Portuguese. Closes: #419959
- French. Closes: #420429
- Italian. Closes: #420461
- Japanese. Closes: #420482
- Catalan. Closes: #420833
- Dutch. Closes: #420925
- Malayalam. Closes: #420986
- Portuguese. Closes: #421032
- Romanian. Closes: #421708
[ Kurt Roeckx ]
* Remove the Provides for the udeb. Patch from Frans Pop. (Closes: #419608)
* Updated Spanish debconf template. (Closes: #421336)
* Do the header changes, changing those defines into real functions,
and bump the shlibs to match.
* Update Japanese debconf translation. (Closes: #422270)
* openssl should depend on libssl0.9.8 0.9.8e-1 since it
uses some of the defines that changed to functions.
Other things build against libssl or libcrypto shouldn't
have this problem since they use the old headers.
(Closes: #414283)
* Add nagios-nrpe-server to the list of services to be checked
(Closes: #391188)
* EVP_CIPHER_CTX_key_length() should return the set key length in the
EVP_CIPHER_CTX structure which may not be the same as the underlying
cipher key length for variable length ciphers.
From upstream CVS. (Closes: #412979)
* Undo include changes that change defines into real functions,
but keep the new functions in the library.
* New upstream release
- Inludes security fixes for CVE-2006-2937, CVE-2006-2940,
CVE-2006-3738, CVE-2006-4343 (Closes: #408902)
- s_client now properly works with SMTP. Also added support
for IMAP. (closes: #221689)
- Load padlock modules (Closes: #345656, #368476)
* Add clamav-freshclam and clamav-daemon to the list of service that
need to be restarted. (Closes: #391191)
* Add armel support. Thanks to Guillem Jover <guillem.jover@nokia.com>
for the patch. (Closes: #407196)
* Add Portuguese translations. Thanks to Carlos Lisboa. (Closes: 408157)
* Add Norwegian translations. Thanks to Bjørn Steensrud
<bjornst@powertech.no> (Closes: #412326)
* Add German debconf translation. Thanks to
Johannes Starosta <feedback-an-johannes@arcor.de> (Closes: #388108)
* Make c_rehash look for both .pem and .crt files. Also make it support
files in DER format. Patch by "Yauheni Kaliuta" <y.kaliuta@gmail.com>
(Closes: #387089)
* Use & instead of && to check a flag in the X509 policy checking.
Patch from upstream cvs. (Closes: #397151)
* Also restart slapd for security updates (Closes: #400221)
* Add Romanian debconf translation. Thanks to
stan ioan-eugen <stan.ieugen@gmail.com> (Closes: #393507)
* Fix patch for CVE-2006-2940, it left ctx unintiliased.
* Fix security vulnerabilities (CVE-2006-2937, CVE-2006-2940,
CVE-2006-3738, CVE-2006-4343). Urgency set to high.
* New upstream release
- block padding bug with compression now fixed upstream, using
their patch.
- Includes the RSA Signature Forgery (CVE-2006-4339) patch.
- New functions AES_bi_ige_encrypt and AES_ige_encrypt:
bumping shlibs to require 0.9.8c-1.
* Change the postinst script to check that ntp is installed instead
of ntp-refclock and ntp-simple. The binary is now in the ntp
package.
* Move the modified rand/md_rand.c file to the right place,
really fixing #363516.
* Add partimage-server conserver-server and tor to the list of service
to check for restart. Add workaround for openssh-server so it finds
the init script. (Closes: #386365, #386400, #386513)
* Add manpage for c_rehash.
Thanks to James Westby <jw+debian@jameswestby.net> (Closes: #215618)
* Add Lithuanian debconf translation.
Thanks to Gintautas Miliauskas <gintas@akl.lt> (Closes: #374364)
* Add m32r support.
Thanks to Kazuhiro Inaoka <inaoka.kazuhiro@renesas.com>
(Closes: #378689)
* Fix RSA Signature Forgery (CVE-2006-4339) using patch provided
by upstream.
* Restart services using a smaller version that 0.9.8b-3, so
they get the fixed version.
* Change the postinst to check for postfix instead of postfix-tls.
* Don't call gcc with -mcpu on i386, we already use -march, so no need for
-mtune either.
* Always make all directories when building something:
- The engines directory didn't get build for the static directory, so
where missing in libcrypo.a
- The apps directory didn't always get build, so we didn't have an openssl
and a small part of the regression tests failed.
* Make the package fail to build if the regression tests fail.
* New upstream release
- New functions added (EVP_CIPHER_CTX_new, EVP_CIPHER_CTX_free), bump shlibs.
- CA.pl/CA.sh now calls openssl ca with -extensions v3_ca, setting CA:TRUE
instead of FALSE.
- CA.pl/CA.sh creates crlnumber now. (Closes: #347612)
* Run debconf-updatepo, which really already was in the 0.9.8a-8 version
as it was uploaded.
* Add Galician debconf translation. Patch from
Jacobo Tarrio <jtarrio@trasno.net> (Closes: #361266)
* libssl0.9.8.postinst makes uses of bashisms (local variables)
so use #!/bin/bash
* libssl0.9.8.postinst: Call set -e after sourcing the debconf
script.
* libssl0.9.8.postinst: Change list of service that may need
to be restarted:
- Replace ssh by openssh-server
- Split postgresql in postgresql-7.4 postgresql-8.0 postgresql-8.1
- Add: dovecot-common bind9 ntp-refclock ntp-simple openntpd clamcour
fetchmail ftpd-ssl proftpd proftpd-ldap proftpd-mysql proftpd-pgsql
* libssl0.9.8.postinst: The check to see if something was installed
wasn't working.
* libssl0.9.8.postinst: Add workaround to find the name of the init
script for proftpd and dovecot.
* libssl0.9.8.postinst: Use invoke-rc.d when it's available.
* Change Standards-Version to 3.7.0:
- Make use of invoke-rc.d
* Add comment to README.Debian that rc5, mdc2 and idea have been
disabled (since 0.9.6b-3) (Closes: #362754)
* Don't add uninitialised data to the random number generator. This stop
valgrind from giving error messages in unrelated code.
(Closes: #363516)
* Put the FAQ in the openssl docs.
* Add russian debconf translations from Yuriy Talakan <yt@amur.elektra.ru>
(Closes #367216)
* Call pod2man with the proper section. Section changed
from 1/3/5/7 to 1SSL/3SSL/5SSL/7SSL. The name of the files
already had the ssl in, the section didn't. The references
to other manpage is still wrong.
* Don't install the LICENSE file, it's already in the copyright file.
* Don't set an rpath on openssl to point to /usr/lib.
* Add support for kfreebsd-amd64. (Closes: #355277)
* Add udeb to the shlibs. Patch from Frans Pop <aragorn@tiscali.nl>
(Closes: #356908)
* Add italian debconf templates. Thanks to Luca Monducci.
(Closes: #350249)
* Change the debconf question to use version 0.9.8-3
instead of 0.9.8-1, since that's the last version
with a security fix.
* Call conn_state() if the BIO is not in the BIO_CONN_S_OK state
(Closes: #352047). RC bug affecting testing, so urgency high.
* Remove empty postinst/preinst/prerm scripts. There is no need
to have empty ones, debhelper will add them when needed.
* Remove the static pic libraries. Nobody should be linking
it's shared libraries static to libssl or libcrypto.
This was added for opensc who now links to it shared.
* Do not assume that in case the sequence number is 0 and the
packet has an odd number of bytes that the other side has
the block padding bug, but try to check that it actually
has the bug. The wrong detection of this bug resulted
in an "decryption failed or bad record mac" error in case
both sides were using zlib compression. (Closes: #338006)
* Stop ssh from crashing randomly on sparc (Closes: #335912)
Patch from upstream cvs.
* Call dh_makeshlibs with the proper version instead of putting
it in shlibs.local, which doesn't seem to do anything. 0.9.8a-1
added symbol versioning, so it should have bumped the shlibs.
(Closes: #338284)
* The openssl package had a duplicate dependency on libssl0.9.8,
only require the version as required by the shlibs.
* Make libssl-dev depend on zlib1g-dev, since it's now required for
static linking. (Closes: #338313)
* Generate .pc files that make use of Libs.private, so things only
link to the libraries they should when linking shared.
* Use -m64 instead of -bpowerpc64-linux on ppc64. (Closes: #335486)
* Make powerpc and ppc64 use the assembler version for bn. ppc64
had the location in the string wrong, powerpc had it missing.
* Add includes for stddef to get size_t in md2.h, md4.h, md5.h,
ripemd.h and sha.h. (Closes: #333101)
* Run make test for each of the versions we build, make it
not fail the build process if an error is found.
* Add build dependency on bc for the regression tests.
* Link to libz instead of dynamicly loading it. It gets loaded
at the moment the library is initialised, so there is no point
in not linking to it. It's now failing in some cases since
it's not opened by it's soname, but by the symlink to it.
This should hopefully solve most of the bugs people have reported
since the move to libssl0.9.8.
(Closes: #334180, #336140, #335271)
* Urgency set to high because it fixes a grave bug affecting testing.
* Add Build-Dependency on m4, since sparc needs it to generate
it's assembler files. (Closes: #334542)
* Don't use rc4-x86_64.o on amd64 for now, it seems to be broken
and causes a segfault. (Closes: #334501, #334502)
Christoph Martin:
* fix asm entries for some architectures, fixing #332758 properly.
* add noexecstack option to i386 subarch
* include symbol versioning in Configure (closes: #330867)
* include debian-armeb arch (closes: #333579)
* include new upstream patches; includes some minor fixes
* fix dh_shlibdeps line, removing the redundant dependency on
libssl0.9.8 (closes: #332755)
* add swedish debconf template (closes: #330554)
Kurt Roeckx:
* Also add noexecstack option for amd64, since it now has an
executable stack with the assembler fixes for amd64.
* Apply security fix for CAN-2005-2969. (Closes: #333500)
* Change priority of -dbg package to extra.
* Don't use arch specific assembler. Should fix build failure on
ia64, sparc and amd64. (Closes: #332758)
* Add myself to the uploaders.
* New upstream release (closes: #311826)
* change Configure line for debian-freebsd-i386 to debian-kfreebsd-i386
(closes: #327692)
* include -dbg version. That implies compiling with -g and without
-fomit-frame-pointer (closes: #293823, #153811)
* really include nl translation
* remove special ia64 code from rc4 code to make the abi compatible to
older 0.9.7 versions (closes: #310489, #309274)
* fix compile flag for debian-ppc64 (closes: #318750)
* small fix in libssl0.9.7.postinst (closes: #239956)
* fix pk7_mime.c to prevent garbled messages because of to early memory
free (closes: #310184)
* include vietnamese debconf translation (closes: #316689)
* make optimized i386 libraries have non executable stack (closes:
#321721)
* remove leftover files from ssleay
* move from dh_installmanpages to dh_installman
* change Maintainer to pkg-openssl-devel@lists.alioth.debian.org
* New upstream release
* Added support for proxy certificates according to RFC 3820.
Because they may be a security thread to unaware applications,
they must be explicitely allowed in run-time. See
docs/HOWTO/proxy_certificates.txt for further information.
* Prompt for pass phrases when appropriate for PKCS12 input format.
* Back-port of selected performance improvements from development
branch, as well as improved support for PowerPC platforms.
* Add lots of checks for memory allocation failure, error codes to indicate
failure and freeing up memory if a failure occurs.
* Perform some character comparisons of different types in X509_NAME_cmp:
this is needed for some certificates that reencode DNs into UTF8Strings
(in violation of RFC3280) and can't or wont issue name rollover
certificates.
* corrected watchfile
* added upstream source url (closes: #292904)
* fix typo in CA.pl.1 (closes: #290271)
* change debian-powerpc64 to debian-ppc64 and adapt the configure
options to be the same like upstream (closes: #289841)
* include -signcert option in CA.pl usage
* compile with zlib-dynamic to use system zlib (closes: #289872)
* really fix der_chop. The fix from -1 was not really included (closes:
#281212)
* still fixes security problem CAN-2004-0975 etc.
- tempfile raise condition in der_chop
- Avoid a race condition when CRLs are checked in a multi threaded
environment.
* fix perl path in der_chop and c_rehash (closes: #281212)
* still fixes security problem CAN-2004-0975 etc.
- tempfile raise condition in der_chop
- Avoid a race condition when CRLs are checked in a multi threaded
environment.
* SECURITY UPDATE: fix insecure temporary file handling
* apps/der_chop:
- replaced $$-style creation of temporary files with
File::Temp::tempfile()
- removed unused temporary file name in do_certificate()
* References:
CAN-2004-0975 (closes: #278260)
* fix ASN1_STRING_to_UTF8 with UTF8 (closes: #260357)
* New upstream release with security fixes
- Avoid a race condition when CRLs are checked in a multi threaded
environment.
- Various fixes to s3_pkt.c so alerts are sent properly.
- Reduce the chances of duplicate issuer name and serial numbers (in
violation of RFC3280) using the OpenSSL certificate creation
utilities.
* depends openssl on perl-base instead of perl (closes: #280225)
* support powerpc64 in Configure (closes: #275224)
* include cs translation (closes: #273517)
* include nl translation (closes: #272479)
* Fix default dir of c_rehash (closes: #253126)
* Make S/MIME encrypt work again (backport from CVS) (closes: #241407,
#241386)
* add Catalan translation (closes: #248749)
* add Spanish translation (closes: #254561)
* include NMU fixes: see below
* decrease optimisation level for debian-arm to work around gcc bug
(closes: #253848) (thanks to Steve Langasek and Thom May)
* Add libcrypto0.9.7-udeb. (closes: #250010) (thanks to Bastian Blank)
* Add watchfile
* rename -pic.a libraries to _pic.a (closes: #250016)
* include PIC libs (libcrypto-pic.a and libssl-pic.a) to libssl-dev
(closes: #246928, #243999)
* add racoon to restart list (closes: #242652)
* add Brazilian, Japanese and Danish translations (closes: #242087,
#241830, #241705)
* new upstream
* fixes security holes (http://www.openssl.org/news/secadv_20040317.txt)
(closes: #238661)
* includes support for debian-amd64 (closes: #235551, #232310)
* fix typo in pem.pod (closes: #219873)
* fix typo in libssl0.9.7.templates (closes: #224690)
* openssl suggests ca-certificates (closes: #217180)
* change debconf template to gettext format (closes: #219013)
* include french debconf template (closes: #219014)
* include openssl.pc into libssl-dev (closes: #212545)
* change question to restart services to debconf (closes: #214840)
* stop using dh_undocumented (closes: #214831)
* fix POSIX conformance for head in libssl0.9.7.postinst (closes:
#214700)
* add filerc macro to libssl0.9.7.postinst (closes: #213906)
* restart spamassassins spamd on upgrade (closes: #214106)
* restart more services on upgrade
* fix EVP_BytesToKey manpage (closes: #213715)
* upstream security fix (closes: #213451)
- Fix various bugs revealed by running the NISCC test suite:
Stop out of bounds reads in the ASN1 code when presented with
invalid tags (CAN-2003-0543 and CAN-2003-0544).
Free up ASN1_TYPE correctly if ANY type is invalid (CAN-2003-0545).
If verify callback ignores invalid public key errors don't try to check
certificate signature with the NULL public key.
- In ssl3_accept() (ssl/s3_srvr.c) only accept a client certificate
if the server requested one: as stated in TLS 1.0 and SSL 3.0
specifications.
* more minor upstream bugfixes
* fix formatting in c_issuer (closes: #190026)
* fix Debian-FreeBSD support (closes: #200381)
* restart some services in postinst to make them use the new libraries
* remove duplicated openssl.1, crypto.3 and ssl.3 (closes: #198594)
* fix permission of /etc/ssl/private to 700 again
* change section of libssl-dev to libdevel
* upstream security fix
- Countermeasure against the Klima-Pokorny-Rosa extension of
Bleichbacher's attack on PKCS #1 v1.5 padding: treat
a protocol version number mismatch like a decryption error
in ssl3_get_client_key_exchange (ssl/s3_srvr.c). (CAN-2003-0131)
(closes: #189087)
- Turn on RSA blinding by default in the default implementation
to avoid a timing attack. Applications that don't want it can call
RSA_blinding_off() or use the new flag RSA_FLAG_NO_BLINDING.
They would be ill-advised to do so in most cases. (CAN-2003-0147)
- Change RSA blinding code so that it works when the PRNG is not
seeded (in this case, the secret RSA exponent is abused as
an unpredictable seed -- if it is not unpredictable, there
is no point in blinding anyway). Make RSA blinding thread-safe
by remembering the creator's thread ID in rsa->blinding and
having all other threads use local one-time blinding factors
(this requires more computation than sharing rsa->blinding, but
avoids excessive locking; and if an RSA object is not shared
between threads, blinding will still be very fast).
for more details see the CHANGES file
* upstream Security fix
- In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked
via timing by performing a MAC computation even if incorrrect
block cipher padding has been found. This is a countermeasure
against active attacks where the attacker has to distinguish
between bad padding and a MAC verification error. (CAN-2003-0078)
for more details see the CHANGES file
* use DH_COMPAT=3 to build
* move i686 to i686/cmov to fix problems on Via C3. For that to work we
have to depend on the newest libc6 on i386 (closes: #177891)
* fix bug in ui_util.c (closes: #177615)
* fix typo in md5.h (closes: #178112)
* enable build of ultrasparc code on non ultrasparc machines (closes:
#177024)
* include changes between 0.9.6g-9 and -10
* fix problem in build-process on i386 with libc6 version number
* new upstream
* includes engine support
* a lot of bugfixes and enhancements, see the CHANGES file
* include AES encryption
* makes preview of certificate configurable (closes: #176059)
* fix x509 manpage (closes: #168070)
* fix declaration of ERR_load_PEM_string in pem.h (closes: #141360)
* fix problem in build-process on i386 with libc6 version number
(closes: #167096)
* fix typo in i386 libc6 depend (sigh) (closes: #163848)
* fix libc6 depends. Only needed for i386 (closes: #163701)
* remove SHLIB section for bsds from Configure (closes: #163585)
* enable i686 optimisation and depend on fixed glibc (closes: #163500)
* remove transition package ssleay
* include optimisation vor sparcv8 (closes: #139996)
* improve optimisation vor sparcv9
* temporarily disable i686 optimisation (See bug in glibc #161788)
* i486 can use i586 assembler
* include set -xe in the for loops in the rules files to make it abort
on error (closes: #161768)
* fix optimization for alpha and sparc
* add optimization for i486
* add optimized libraries for i586, i686, ev4, ev5 and v9 (closes: #139783)
* fix manpage names (closes: #156717, #156718, #156719, #156721)
* new upstream version
* Use proper error handling instead of 'assertions' in buffer
overflow checks added in 0.9.6e. This prevents DoS (the
assertions could call abort()). (closes: #155985, #156495)
* Fix ASN1 checks. Check for overflow by comparing with LONG_MAX
and get fix the header length calculation.
* include support for new sh* architectures (closes: #155117)
* fixes remote exploits (see DSA-136-1)
* new upstream (minor) version
* includes Configure lines for debian-*bsd-* (closes: #130413)
* fix wrong prototype for BN_pseudo_rand_range in BN_rand(3ssl) (closes:
#144586)
* fix typos in package description (closes: #141469)
* fix typo in SSL_CTX_set_cert_store manpage (closes: #135297)
* moved from non-US to main
* new upstream version with a lot of bugfixes
* remove directory /usr/include/openssl from openssl package (closes:
bug #121226)
* remove selfdepends from libssl0.9.6
* link openssl binary shared again
* build with -D_REENTRANT for threads support on all architectures
(closes: #112329, #119239)
* disable idea, mdc2 and rc5 because they are not free (closes: #65368)
* ready to be moved from nonus to main
* fix definition of crypt in des.h (closes: #107533)
* fix descriptions (closes: #109503)
* new upstream fixes some security issues (closes: #105835, #100146)
* added support for s390 (closes: #105681)
* added support for sh (closes: #100003)
* change priority of libssl096 to standard as ssh depends on it (closes:
#105440)
* don't optimize for i486 to support i386. (closes: #104127, #82194)
* add perl-base to builddeps
* include static libraries in libssl-dev (closes: #93688)
* change Architecture of ssleay from any to all (closes: #92913)
* depend libssl-dev on the exact same version of libssl0.9.6 (closes:
#88939)
* remove lib{crypto,ssl}.a from openssl (closes: #93666)
* rebuild with newer gcc to fix atexit problem (closes: #94036)
* new upstream, fixes some security bugs (closes: #90584)
* fix typo in s_server manpage (closes: #89756)
* policy: reorganisation of package names: libssl096 -> libssl0.9.6,
libssl096-dev -> libssl-dev (closes: #83426)
* libssl0.9.6 drops replaces libssl09 (Closes: #83425)
* install upstream CHANGES files (Closes: #83430)
* added support for hppa and ia64 (Closes: #88790)
* move man3 manpages to libssl-dev (Closes: #87546)
* fix formating problem in rand_add(1) (Closes: #87547)
* remove manpage duplicates (Closes: #87545, #74986)
* make package descriptions clearer (Closes: #83518, #83444)
* increase default emailAddress_max from 40 to 60 (Closes: #67238)
* removed RSAREF warning (Closes: #84122)
* New upstream version (Thanks to Enrique Zanardi <ezanard@debian.org>)
(closes: #72388)
* Add support for debian-hurd (closes: #76032)
* move manpages in standard directories with section ssl (closes:
#72152, #69809)
* include edg_rand_bytes patch from and for apache-ssl
* fix call to dh_makeshlibs to create correct shlibs file and make
dependend programs link correctly (closes: Bug#61658)
* include a note in README.debian concerning the location of the
subcommand manpages (closes: Bug#69809)
* try to fix the sharedlib problem. change soname of library
(closes: Bug#4622, #66102, #66538, #66123)
* new upstream version (major changes see file NEWS) (closes: Bug#63976,
#65239, #65358)
* new library package libssl095a because of probably changed library
interface (closes: Bug#46222)
* added architecture mips and mipsel (closes: Bug#62437, #60366)
* provide shlibs.local file in build to help build if libraries are not
yet installed (closes: Bug#63984)
* cleanup of move of doc directories to /usr/share/doc (closes:
Bug#56430)
* lintian issues (closes: Bug#49358)
* move demos from openssl to libssl09-dev (closes: Bug#59201)
* move to debhelpers
* Added 'debian-arm' in 'Configure'. (closes: Bug#54251, #54766)
* Fixed Configure for 'debian-m68k' (closes: Bug#53636)
* define symbol SSLeay_add_ssl_algorithms for backward compatibility
(closes: Bug#46882)
* remove manpages from /usr/doc/openssl (closes: Bug#46791)
* include some more docu in pod format (Bug #43933)
* removed -mv8 from sparc flags (Bug #44769)
* new upstream version (Closes: #42926)
* new upstream version (Bug #38345, #38627)
* sparc is big-endian (Bug #39973)
* correct move conffiles to /etc/ssl (Bug #38570)
* added convenience package ssleay to help upgrade to openssl (Bug
#37185, #37623, #36326)
* added some missing dependencies from libssl09 (Bug #36681, #35867,
#36326)
* move lib*.so to libssl09-dev (Bug #36761)
* corrected version numbers of library files
* introduce link from /usr/lib/ssl to /etc/ssl (Bug #36710)
* First openssl version
* Include message about the (not)usage of RSAREF (#24409)
* Move configfiles from /usr/lib/ssl to /etc/ssl (#26406)
* Change definitions for sparc (#26487)
* Added missing dependency (#28591)
* Make debian/libtool executable (#29708)
* /etc/ssl/lib/ssleay.cnf is now a confile (#32624)
* new upstream version (Bug #21227, #25971)
* build shared libraries with -fPIC (Bug #20027)
* support sparc architecture (Bug #28467)
* security fix patch to 0.8.1b (bug #24022)
* second try to fix bug #15235 (copyright was still missing)
* changed /dev/random to /dev/urandom (Bug #23169, #17817)
* copyright contains now the full licence (Bug #15235)
* fixed bug #19410 (md5sums-lists-nonexisting-file)
* added demos to /usr/doc (Bug #17372)
* fixed type in package description (Bug #18969)
* fixed bug in adding documentation (Bug #21463)
* added patch for support of debian-powerpc (Bug #21579)
* purged dependency from libc5
* changed packagename libssl to libssl08 to get better dependancies
* linked shared libraries against libc6
* use /dev/random for randomseed
* new upstream version
* cleanup in diffs
* removed INSTALL from docs (bug #13205)
* split libssl and libssl-dev (but #13735)
* New upstream version
* added shared libraries for libcrypto and libssl
* changed doc filenames from .doc to .txt to be able to read them
over with webbrowser
* Initial Release.