Skip to content

Changelog openssl1.0 (1.0.2n-1ubuntu5.11)

2023

openssl1.0 (1.0.2n-1ubuntu5.11) bionic-security; urgency=medium

   * SECURITY UPDATE: Use-after-free following BIO_new_NDEF
     - debian/patches/CVE-2023-0215.patch: fix a UAF resulting from a bug in
       BIO_new_NDEF in crypto/asn1/bio_ndef.c.
     - CVE-2023-0215
   * SECURITY UPDATE: X.400 address type confusion in X.509 GeneralName
     - debian/patches/CVE-2023-0286.patch: fix GENERAL_NAME_cmp for
       x400Address in crypto/x509/v3_genn.c, crypto/x509v3/x509v3.h.
     - CVE-2023-0286

2022

openssl1.0 (1.0.2n-1ubuntu5.10) bionic-security; urgency=medium

   * SECURITY UPDATE: c_rehash script allows command injection
     - debian/patches/CVE-2022-1292.patch: switch to upstream patch, and
       apply it before c_rehash-compat.patch.
     - debian/patches/CVE-2022-2068.patch: fix file operations in
       tools/c_rehash.in.
     - debian/patches/c_rehash-compat.patch: updated patch to apply after
       the security updates.
     - CVE-2022-2068

openssl1.0 (1.0.2n-1ubuntu5.9) bionic-security; urgency=medium

   * SECURITY UPDATE: c_rehash script allows command injection
     - debian/patches/CVE-2022-1292.patch: do not use shell to invoke
       openssl in tools/c_rehash.in.
     - CVE-2022-1292

openssl1.0 (1.0.2n-1ubuntu5.8) bionic-security; urgency=medium

   * SECURITY UPDATE: Infinite loop in BN_mod_sqrt()
     - debian/patches/CVE-2022-0778.patch: fix infinite loop in
       crypto/bn/bn_sqrt.c.
     - CVE-2022-0778

2021

openssl1.0 (1.0.2n-1ubuntu5.7) bionic-security; urgency=medium

   * SECURITY UPDATE: Read buffer overrun in X509_aux_print()
     - debian/patches/CVE-2021-3712.patch: fix a read buffer overrun in
       X509_CERT_AUX_print() in crypto/asn1/t_x509a.c.
     - debian/patches/CVE-2021-3712-2.patch: fix i2v_GENERAL_NAME to not
       assume NUL terminated strings in crypto/x509v3/v3_alt.c,
       crypto/x509v3/v3_utl.c, crypto/x509v3/x509v3.h.
     - debian/patches/CVE-2021-3712-3.patch: fix POLICYINFO printing to not
       assume NUL terminated strings in crypto/x509v3/v3_cpols.c.
     - debian/patches/CVE-2021-3712-4.patch: fix printing of
       PROXY_CERT_INFO_EXTENSION to not assume NUL terminated strings in
       crypto/x509v3/v3_pci.c.
     - debian/patches/CVE-2021-3712-5.patch: fix the name constraints code
       to not assume NUL terminated strings in crypto/x509v3/v3_ncons.c.
     - debian/patches/CVE-2021-3712-7.patch: fix append_ia5 function to not
       assume NUL terminated strings in crypto/x509v3/v3_utl.c.
     - debian/patches/CVE-2021-3712-8.patch: fix NETSCAPE_SPKI_print
       function to not assume NUL terminated strings in
       crypto/asn1/t_spki.c.
     - debian/patches/CVE-2021-3712-9.patch: fix
       EC_GROUP_new_from_ecparameters to check the base length in
       crypto/ec/ec_asn1.c.
     - debian/patches/CVE-2021-3712-11.patch: fix the error handling in
       i2v_AUTHORITY_KEYID in crypto/x509v3/v3_akey.c.
     - debian/patches/CVE-2021-3712-13.patch: fix the name constraints code
       to not assume NUL terminated strings in crypto/x509v3/v3_ncons.c.
     - debian/patches/CVE-2021-3712-14.patch: fix i2v_GENERAL_NAME to not
       assume NUL terminated strings in crypto/x509v3/v3_utl.c.
     - CVE-2021-3712

openssl1.0 (1.0.2n-1ubuntu5.6) bionic-security; urgency=medium

   * SECURITY UPDATE: Integer overflow in CipherUpdate
     - debian/patches/CVE-2021-23840-pre1.patch: add new EVP error codes in
       crypto/evp/evp_err.c, crypto/evp/evp.h.
     - debian/patches/CVE-2021-23840-pre2.patch: add a new EVP error code in
       crypto/evp/evp_err.c, crypto/evp/evp.h.
     - debian/patches/CVE-2021-23840.patch: don't overflow the output length
       in EVP_CipherUpdate calls in crypto/evp/evp_enc.c,
       crypto/evp/evp_err.c, crypto/evp/evp.h.
     - CVE-2021-23840
   * SECURITY UPDATE: Null pointer deref in X509_issuer_and_serial_hash()
     - debian/patches/CVE-2021-23841.patch: fix Null pointer deref in
       crypto/x509/x509_cmp.c.
     - CVE-2021-23841

2020

openssl1.0 (1.0.2n-1ubuntu5.5) bionic-security; urgency=medium

   * SECURITY UPDATE: EDIPARTYNAME NULL pointer de-ref
     - debian/patches/CVE-2020-1971-1.patch: use explicit tagging for
       DirectoryString in crypto/x509v3/v3_genn.c.
     - debian/patches/CVE-2020-1971-2.patch: correctly compare EdiPartyName
       in crypto/x509v3/v3_genn.c.
     - debian/patches/CVE-2020-1971-3.patch: check that multi-strings/CHOICE
       types don't use implicit tagging in crypto/asn1/asn1_err.c,
       crypto/asn1/tasn_dec.c, crypto/asn1/asn1.h.
     - debian/patches/CVE-2020-1971-4.patch: complain if we are attempting
       to encode with an invalid ASN.1 template in crypto/asn1/asn1_err.c,
       crypto/asn1/tasn_enc.c, crypto/asn1/asn1.h.
     - debian/patches/CVE-2020-1971-5.patch: add a test for GENERAL_NAME_cmp
       in crypto/x509v3/v3nametest.c.
     - CVE-2020-1971

openssl1.0 (1.0.2n-1ubuntu5.4) bionic-security; urgency=medium

   * SECURITY UPDATE: Raccoon Attack
     - debian/patches/CVE-2020-1968.patch: disable ciphers that reuse the
       DH secret across multiple TLS connections in ssl/s3_lib.c.
     - CVE-2020-1968
   * SECURITY UPDATE: ECDSA remote timing attack
     - debian/patches/CVE-2019-1547.patch: for ECC parameters with NULL or
       zero cofactor, compute it in crypto/ec/ec.h, crypto/ec/ec_err.c,
       crypto/ec/ec_lib.c.
     - CVE-2019-1547
   * SECURITY UPDATE: rsaz_512_sqr overflow bug on x86_64
     - debian/patches/CVE-2019-1551.patch: fix an overflow bug in
       rsaz_512_sqr in crypto/bn/asm/rsaz-x86_64.pl.
     - CVE-2019-1551
   * SECURITY UPDATE: Padding Oracle issue
     - debian/patches/CVE-2019-1563.patch: fix a padding oracle in
       PKCS7_dataDecode and CMS_decrypt_set1_pkey in crypto/cms/cms_env.c,
       crypto/cms/cms_lcl.h, crypto/cms/cms_smime.c,
       crypto/pkcs7/pk7_doit.c.
     - CVE-2019-1563

2019

openssl1.0 (1.0.2n-1ubuntu5.3) bionic-security; urgency=medium

   * SECURITY UPDATE: 0-byte record padding oracle
     - debian/patches/CVE-2019-1559.patch: go into the error state if a
       fatal alert is sent or received in ssl/d1_pkt.c, ssl/s3_pkt.c.
     - CVE-2019-1559
   * debian/patches/s390x-fix-aes-gcm-tls.patch: fix typo in backported
     s390x hw acceleration patch. (LP: #1775018)

2018

openssl1.0 (1.0.2n-1ubuntu5.2) bionic-security; urgency=medium

   * SECURITY UPDATE: PortSmash side channel attack
     - debian/patches/CVE-2018-5407.patch: fix timing vulnerability in
       crypto/bn/bn_lib.c, crypto/ec/ec_mult.c.
     - CVE-2018-5407
   * SECURITY UPDATE: timing side channel attack in DSA
     - debian/patches/CVE-2018-0734-1.patch: fix timing vulnerability in
       crypto/dsa/dsa_ossl.c.
     - debian/patches/CVE-2018-0734-2.patch: fix mod inverse in
       crypto/dsa/dsa_ossl.c.
     - debian/patches/CVE-2018-0734-3.patch: add a constant time flag in
       crypto/dsa/dsa_ossl.c.
     - CVE-2018-0734

openssl1.0 (1.0.2n-1ubuntu5.1) bionic-security; urgency=medium

   * SECURITY UPDATE: ECDSA key extraction side channel
     - debian/patches/CVE-2018-0495.patch: add blinding to an ECDSA
       signature in crypto/ecdsa/ecdsatest.c, crypto/ecdsa/ecs_ossl.c.
     - CVE-2018-0495
   * SECURITY UPDATE: denial of service via long prime values
     - debian/patches/CVE-2018-0732.patch: reject excessively large primes
       in DH key generation in crypto/dh/dh_key.c.
     - CVE-2018-0732
   * SECURITY UPDATE: RSA cache timing side channel attack
     - debian/patches/CVE-2018-0737-1.patch: replaced variable-time GCD in
       crypto/rsa/rsa_gen.c.
     - debian/patches/CVE-2018-0737-2.patch: used ERR set/pop mark in
       crypto/rsa/rsa_gen.c.
     - debian/patches/CVE-2018-0737-3.patch: consttime flag changed in
       crypto/rsa/rsa_gen.c.
     - debian/patches/CVE-2018-0737-4.patch: ensure BN_mod_inverse and
       BN_mod_exp_mont both get called with BN_FLG_CONSTTIME flag set in
       crypto/rsa/rsa_gen.c.
     - CVE-2018-0737

openssl1.0 (1.0.2n-1ubuntu5) bionic; urgency=medium

   * SECURITY UPDATE: DoS via ASN.1 types with a recursive definition
     - debian/patches/CVE-2018-0739.patch: limit stack depth in
       crypto/asn1/asn1.h, crypto/asn1/asn1_err.c, crypto/asn1/tasn_dec.c.
     - CVE-2018-0739

openssl1.0 (1.0.2n-1ubuntu4) bionic; urgency=medium

   * s390x: Add support for CPACF enhancements to openssl, for IBM z14. LP:
     #1743750

openssl1.0 (1.0.2n-1ubuntu3) bionic; urgency=medium

   * Create openssl1.0 package which ships 1.0 variant of utilities. LP: #1747447
   * Move libraries back from /lib to /usr/lib, as otherwise d-i helpfully
     deletes "duplicate" soname libraries, and thus breaking
     network-console. LP: #1749442

openssl1.0 (1.0.2n-1ubuntu2) bionic; urgency=medium

   * Change package name to openssl1.0
   * Drop openssl, libssl-dev, libssl-doc packages, and stop adding
     symlinks for them.
   * Mark libssl1.0-dev to conflict with libssl-dev.
   * Correct soname in debian/libssl1.0.0-udeb.lintian-overrides and
     debian/libssl1.0.0.lintian-overrides.

openssl (1.0.2n-1ubuntu1) bionic; urgency=medium

   * Merge with Debian, remaining changes.
     - Use openssl source package name, instead of openssl1.0.
     - Make libssl-dev a metapackage pointing at libssl1.0-dev package.
     - Ship openssl package.
     - Disable SSLv3 without changing ABI:
       + debian/patches/no-sslv3.patch: Disable SSLv3 without using the
         no-ssl3-method option
       + debian/rules: don't use no-ssl3-method, don't bump soname
       + debian/patches/engines-path.patch: don't bump soname
       + debian/patches/version-script.patch: don't bump soname
       + debian/patches/soname.patch: removed
       + debian/lib*: don't bump soname
     - debian/rules: don't enable rfc3779 and cms support for now as it
       changes ABI.
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
     - Enable asm optimisations on s390x. LP: #1602655.
 
   * Changes applied in Debian:
     - debian/rules: Enable optimized 64bit elliptic curve code contributed
       by Google.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb. Same has been applied
       in Debian.
 
    * Dropped patches, part of new upstream release:
       - CVE-2016-2105.patch
       - CVE-2016-2106.patch
       - CVE-2016-2107.patch
       - CVE-2016-2108.patch
       - CVE-2016-2109.patch
       - 0b48a24ce993d1a4409d7bde26295f6df0d173cb.patch
       - CVE-2016-2177.patch
       - CVE-2016-2178-1.patch
       - CVE-2016-2178-2.patch
       - CVE-2016-2179.patch
       - CVE-2016-2180.patch
       - CVE-2016-2181-1.patch
       - CVE-2016-2181-2.patch
       - CVE-2016-2181-3.patch
       - CVE-2016-2182.patch
       - CVE-2016-2183.patch
       - CVE-2016-6302.patch
       - CVE-2016-6303.patch
       - CVE-2016-6304.patch
       - CVE-2016-6306-1.patch
       - CVE-2016-6306-2.patch
       - CVE-2016-2182-2.patch
       - CVE-2016-7055.patch
       - CVE-2016-8610.patch
       - CVE-2016-8610-2.patch
       - CVE-2017-3731.patch
       - CVE-2017-3732.patch
       - move-extended-feature-detection.patch
       - fix-sha-ni.patch
       - CVE-2017-3735.patch
       - CVE-2017-3736.patch
       - fix_armhf_ftbfs.patch
       - CVE-2017-3737-pre.patch
       - CVE-2017-3737-1.patch
       - CVE-2017-3737-2.patch
       - CVE-2017-3738.patch

2017

openssl1.0 (1.0.2n-1) unstable; urgency=medium

   * New upstream version 1.0.2n
     - drop patches which applied upstream:
       - 0001-Fix-no-ssl3-build.patch
       - 0001-aes-armv4-bsaes-armv7-sha256-armv4-.pl-make-it-work-.patch
     - Fixes CVE-2017-3737 (Read/write after SSL object in error state)
     - Fixes CVE-2017-3738 (rsaz_1024_mul_avx2 overflow bug on x86_64)
   * move to gbp
   * Abort the build if symbols are discovered which are not part of the
     symbols file.

openssl1.0 (1.0.2m-3) unstable; urgency=medium

   * Avoid problems with aes and sha256 assembler on armhf using binutils 2.29

openssl1.0 (1.0.2m-2) unstable; urgency=medium

   * Fix no-ssl3-method build

openssl1.0 (1.0.2m-1) unstable; urgency=high

   [ Kurt Roeckx ]
   * New upstream version
     - Fixes CVE-2017-3735
     - Fixes CVE-2017-3736
 
   [ Sebastian Andrzej Siewior]
   * Add support for arm64ilp32, Patch by Wookey (Closes: #874709).

openssl1.0 (1.0.2l-2) unstable; urgency=medium

   * Make the udeb use a versioned depends (Closes: #864081)

openssl1.0 (1.0.2l-1) unstable; urgency=medium

   * New upstream release
     - Properly detect features on the AMD Ryzen processor (Closes: #861145)
   * Refresh valgrind.patch

openssl1.0 (1.0.2k-1) unstable; urgency=medium

   * New upstream release
     - Fixes CVE-2017-3731
     - Fixes CVE-2017-3732
     - Fixes CVE-2016-7055

2016

openssl1.0 (1.0.2j-5) unstable; urgency=medium

   * Add myself as Uploader.
   * Drop zlib1g-dev from libssl1.0-dev's deps (Closes: #845945).
   * Mark RC4 and 3DES as weak which removes them from the SSL/TLS protocol
     (Closes: #736687).
   * Update Standards-Version, no change required.
   * Drop asm support for X32 because the testsuite segfaults.
   * Limit the watchfile to the 1.0.2x series.
   * Redo rules file to newer debhelper syntax
   * Add homepage filed
   * Remove recommends for libssl-doc because the doc package from 1.1.0 is not
     really matching the -dev package from 1.0.2

openssl1.0 (1.0.2j-4) unstable; urgency=medium

   * Re-add udebs

openssl1.0 (1.0.2j-3) unstable; urgency=medium

   * Upload to unstable

openssl1.0 (1.0.2j-2) experimental; urgency=medium

   * Provide an 1.0.2 version of the library for Stretch.

openssl (1.0.2j-1) unstable; urgency=medium

   * New upstream release
     - Fixes CVE-2016-7052

openssl (1.0.2i-1) unstable; urgency=high

   * New upstream version
     - Fix CVE-2016-2177
     - Fix CVE-2016-2178
     - Fix CVE-2016-2179
     - Fix CVE-2016-2180
     - Fix CVE-2016-2181
     - Fix CVE-2016-2182
     - Fix CVE-2016-2183
     - Fix CVE-2016-6302
     - Fix CVE-2016-6303
     - Fix CVE-2016-6304
     - Fix CVE-2016-6306
   * Drop ca.patch, option is now documented upstream
   * Update engines-path.patch to also update the libcrypto.pc, now that that
     has an enginesdir in it.

openssl (1.0.2h-2) unstable; urgency=medium

   * Re-add libdoc-manpgs-pod-spell.patch to series files (Closes: #813191)
   * Don't build i686 optimized version anymore on i386, it's now the default.
     (Closes: #823774)

openssl (1.0.2h-1) unstable; urgency=high

   * New upstream version
     - Fixes CVE-2016-2107
     - Fixes CVE-2016-2105
     - Fixes CVE-2016-2106
     - Fixes CVE-2016-2109
     - Fixes CVE-2016-2176

openssl (1.0.2g-2) unstable; urgency=medium

   * Use assembler of arm64 (Closes: #794326)
     Patch from Riku Voipio <riku.voipio@iki.fi>
   * Add a udeb for libssl, based on similar changes done in Ubuntu
     starting in version 0.9.8o-4ubuntu1 (Closes: #802591)
     Patch from Margarita Manterola <marga@google.com>
   * Add support for nios2 (Closes: #816239)
     Based on patch from Marek Vasut <marex@denx.de>
   * Update Spanish translation from Manuel "Venturi" Porras Peralta
     <venturi@openmailbox.org> (Closes: #773601)
   * Don't build an i586 optimized version anymore, the default
     already targets that.  Patch from Sven Joachim <svenjoac@gmx.de>
     (Closes: #759811)

openssl (1.0.2g-1ubuntu15) bionic; urgency=medium

   * SECURITY UPDATE: Read/write after SSL object in error state
     - debian/patches/CVE-2017-3737-pre.patch: add test/ssltestlib.*,
       add to test/Makefile.
     - debian/patches/CVE-2017-3737-1.patch: don't allow read/write after
       fatal error in ssl/ssl.h.
     - debian/patches/CVE-2017-3737-2.patch: add test to ssl/Makefile,
       ssl/fatalerrtest.c, test/Makefile.
     - CVE-2017-3737
   * SECURITY UPDATE: rsaz_1024_mul_avx2 overflow bug on x86_64
     - debian/patches/CVE-2017-3738.patch: fix digit correction bug in
       crypto/bn/asm/rsaz-avx2.pl.
     - CVE-2017-3738

openssl (1.0.2g-1ubuntu14) bionic; urgency=medium

   * SECURITY UPDATE: Malformed X.509 IPAddressFamily could cause OOB read
     - debian/patches/CVE-2017-3735.patch: avoid out-of-bounds read in
       crypto/x509v3/v3_addr.c.
     - CVE-2017-3735
   * SECURITY UPDATE: bn_sqrx8x_internal carry bug on x86_64
     - debian/patches/CVE-2017-3736.patch: fix carry bug in
       bn_sqrx8x_internal in crypto/bn/asm/x86_64-mont5.pl.
     - CVE-2017-3736
   * debian/patches/fix_armhf_ftbfs.patch: fix build with gcc-7.2 on armhf.
     (LP: #1729850)

openssl (1.0.2g-1ubuntu13) artful; urgency=medium

   * aes/asm/aesni-sha*-x86_64.pl: fix IV handling in SHAEXT paths.
     (LP: #1674399)

openssl (1.0.2g-1ubuntu12) artful; urgency=medium

   * crypto/x86*cpuid.pl: move extended feature detection. (LP: #1674399)
     This fix moves extended feature detection past basic feature
     detection where it belongs. 32-bit counterpart is harmonized too.

openssl (1.0.2g-1ubuntu11) zesty; urgency=medium

   * SECURITY UPDATE: Montgomery multiplication may produce incorrect
     results
     - debian/patches/CVE-2016-7055.patch: fix logic in
       crypto/bn/asm/x86_64-mont.pl.
     - CVE-2016-7055
   * SECURITY UPDATE: DoS via warning alerts
     - debian/patches/CVE-2016-8610.patch: don't allow too many consecutive
       warning alerts in ssl/d1_pkt.c, ssl/s3_pkt.c, ssl/ssl.h,
       ssl/ssl_locl.h.
     - debian/patches/CVE-2016-8610-2.patch: fail if an unrecognised record
       type is received in ssl/s3_pkt.c.
     - CVE-2016-8610
   * SECURITY UPDATE: Truncated packet could crash via OOB read
     - debian/patches/CVE-2017-3731.patch: harden RC4_MD5 cipher in
       crypto/evp/e_rc4_hmac_md5.c.
     - CVE-2017-3731
   * SECURITY UPDATE: BN_mod_exp may produce incorrect results on x86_64
     - debian/patches/CVE-2017-3732.patch: fix carry bug in
       bn_sqr8x_internal in crypto/bn/asm/x86_64-mont5.pl.
     - CVE-2017-3732

openssl (1.0.2g-1ubuntu10) zesty; urgency=medium

   * Provide libssl1.0-dev metapackage to satisfy dep-waits.

openssl (1.0.2g-1ubuntu9) yakkety; urgency=medium

   * SECURITY UPDATE: Pointer arithmetic undefined behaviour
     - debian/patches/CVE-2016-2177.patch: avoid undefined pointer
       arithmetic in ssl/s3_srvr.c, ssl/ssl_sess.c, ssl/t1_lib.c.
     - CVE-2016-2177
   * SECURITY UPDATE: Constant time flag not preserved in DSA signing
     - debian/patches/CVE-2016-2178-*.patch: preserve BN_FLG_CONSTTIME in
       crypto/dsa/dsa_ossl.c.
     - CVE-2016-2178
   * SECURITY UPDATE: DTLS buffered message DoS
     - debian/patches/CVE-2016-2179.patch: fix queue handling in
       ssl/d1_both.c, ssl/d1_clnt.c, ssl/d1_lib.c, ssl/d1_srvr.c,
       ssl/ssl_locl.h.
     - CVE-2016-2179
   * SECURITY UPDATE: OOB read in TS_OBJ_print_bio()
     - debian/patches/CVE-2016-2180.patch: fix text handling in
       crypto/ts/ts_lib.c.
     - CVE-2016-2180
   * SECURITY UPDATE: DTLS replay protection DoS
     - debian/patches/CVE-2016-2181-1.patch: properly handle unprocessed
       records in ssl/d1_pkt.c.
     - debian/patches/CVE-2016-2181-2.patch: protect against replay attacks
       in ssl/d1_pkt.c, ssl/ssl.h, ssl/ssl_err.c.
     - debian/patches/CVE-2016-2181-3.patch: update error code in ssl/ssl.h.
     - CVE-2016-2181
   * SECURITY UPDATE: OOB write in BN_bn2dec()
     - debian/patches/CVE-2016-2182.patch: don't overflow buffer in
       crypto/bn/bn_print.c.
     - debian/patches/CVE-2016-2182-2.patch: fix off-by-one in overflow
       check in crypto/bn/bn_print.c.
     - CVE-2016-2182
   * SECURITY UPDATE: SWEET32 Mitigation
     - debian/patches/CVE-2016-2183.patch: move DES ciphersuites from HIGH
       to MEDIUM in ssl/s3_lib.c.
     - CVE-2016-2183
   * SECURITY UPDATE: Malformed SHA512 ticket DoS
     - debian/patches/CVE-2016-6302.patch: sanity check ticket length in
       ssl/t1_lib.c.
     - CVE-2016-6302
   * SECURITY UPDATE: OOB write in MDC2_Update()
     - debian/patches/CVE-2016-6303.patch: avoid overflow in
       crypto/mdc2/mdc2dgst.c.
     - CVE-2016-6303
   * SECURITY UPDATE: OCSP Status Request extension unbounded memory growth
     - debian/patches/CVE-2016-6304.patch: remove OCSP_RESPIDs from previous
       handshake in ssl/t1_lib.c.
     - CVE-2016-6304
   * SECURITY UPDATE: Certificate message OOB reads
     - debian/patches/CVE-2016-6306-1.patch: check lengths in ssl/s3_clnt.c,
       ssl/s3_srvr.c.
     - debian/patches/CVE-2016-6306-2.patch: make message buffer slightly
       larger in ssl/d1_both.c, ssl/s3_both.c.
     - CVE-2016-6306

openssl (1.0.2g-1ubuntu8) yakkety; urgency=medium

   * Remove unused FIPS patches for now. (LP: #1594748, LP: #1593953,
     LP: #1591797, LP: #1588524)

openssl (1.0.2g-1ubuntu7) yakkety; urgency=medium

   * Cherry-pick s390x assembly pack bugfix to cache capability query
     results for improved performance. LP: #1601836.

openssl (1.0.2g-1ubuntu6) yakkety; urgency=medium

   * Enable asm optimisations on s390x. LP: #1602655.

openssl (1.0.2g-1ubuntu5) yakkety; urgency=medium

   * SECURITY UPDATE: EVP_EncodeUpdate overflow
     - debian/patches/CVE-2016-2105.patch: properly check lengths in
       crypto/evp/encode.c, add documentation to
       doc/crypto/EVP_EncodeInit.pod, doc/crypto/evp.pod.
     - CVE-2016-2105
   * SECURITY UPDATE: EVP_EncryptUpdate overflow
     - debian/patches/CVE-2016-2106.patch: fix overflow in
       crypto/evp/evp_enc.c.
     - CVE-2016-2106
   * SECURITY UPDATE: Padding oracle in AES-NI CBC MAC check
     - debian/patches/CVE-2016-2107.patch: check that there are enough
       padding characters in crypto/evp/e_aes_cbc_hmac_sha1.c,
       crypto/evp/e_aes_cbc_hmac_sha256.c.
     - CVE-2016-2107
   * SECURITY UPDATE: Memory corruption in the ASN.1 encoder
     - debian/patches/CVE-2016-2108.patch: fix ASN1_INTEGER handling in
       crypto/asn1/a_type.c, crypto/asn1/asn1.h, crypto/asn1/tasn_dec.c,
       crypto/asn1/tasn_enc.c.
     - CVE-2016-2108
   * SECURITY UPDATE: ASN.1 BIO excessive memory allocation
     - debian/patches/CVE-2016-2109.patch: properly handle large amounts of
       data in crypto/asn1/a_d2i_fp.c.
     - CVE-2016-2109

openssl (1.0.2g-1ubuntu4) xenial; urgency=medium

   * Rename Fedora-imported FIPS patches to the names they have in Fedora, add
     correct "Origin:" tags, and move Ubuntu modifications in them into
     openssl-1.0.2g-ubuntu-fips-cleanup.patch.

openssl (1.0.2g-1ubuntu3) xenial; urgency=medium

   * Add fips support to openssl, LP: #1553309
     - debian/patches/openssl-1.0.2g-fips.patch: [PATCH 1/6] Add selftest, fips
       support, crypto compliance and define OPENSSL_FIPS.
     - debian/patches/openssl-1.0.2g-fips-ec.patch: [PATCH 2/6] Add fips compliance
       for EC curves.
     - debian/patches/openssl-1.0.2g-fips-md5-allow.patch: [PATCH 3/6] Allow md5 in
       fips mode.
     - debian/patches/openssl-1.0.2g-fips-ctor.patch: [PATCH 4/6] Re-factor integrity
       check for fips mode.
     - debian/patches/openssl-1.0.2g-new-fips-reqs.patch: [PATCH 5/6] New fips
       requirements.
     - debian/patches/openssl-1.0.2g-ubuntu-fips-cleanup.patch: [PATCH 6/6] Cleanup
       compiler warnings, use upstream error codes, DSA, DSA2, fips_utl.h; add
       additional upstream tests to fips_test_suite; allow all EC curves.

openssl (1.0.2g-1ubuntu2) xenial; urgency=medium

   * debian/patches/arm64-aarch64_asm.patch: Enable aarch64 asm routines
     (LP: #1552939).

openssl (1.0.2g-1ubuntu1) xenial; urgency=medium

   * Merge with Debian, remaining changes.
     - Disable SSLv3 without changing ABI:
       + debian/patches/no-sslv3.patch: Disable SSLv3 without using the
         no-ssl3-method option
       + debian/rules: don't use no-ssl3-method, don't bump soname
       + debian/patches/engines-path.patch: don't bump soname
       + debian/patches/version-script.patch: don't bump soname
       + debian/patches/soname.patch: removed
       + debian/lib*: don't bump soname
     - debian/control: don't enable rfc3779 and cms support for now as it
       changes ABI.
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i586 (on i386)
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
     - debian/rules: Enable optimized 64bit elliptic curve code contributed
       by Google.

openssl (1.0.2g-1) unstable; urgency=high

   * New upstream version
   * Fix CVE-2016-0797
   * Fix CVE-2016-0798
   * Fix CVE-2016-0799
   * Fix CVE-2016-0702
   * Fix CVE-2016-0705
   * Disable EXPORT and LOW ciphers: The DROWN attack (CVE-2016-0800)
     makes use of those, and SLOTH attack (CVE-2015-7575) can make use of them
     too.

openssl (1.0.2f-2ubuntu1) xenial; urgency=medium

   * Merge with Debian, remaining changes.
     - Disable SSLv3 without changing ABI:
       + debian/patches/no-sslv3.patch: Disable SSLv3 without using the
         no-ssl3-method option
       + debian/rules: don't use no-ssl3-method, don't bump soname
       + debian/patches/engines-path.patch: don't bump soname
       + debian/patches/version-script.patch: don't bump soname
       + debian/patches/soname.patch: removed
       + debian/lib*: don't bump soname
     - debian/control: don't enable rfc3779 and cms support for now as it
       changes ABI.
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i586 (on i386)
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
     - debian/rules: Enable optimized 64bit elliptic curve code contributed
       by Google.
   * debian/patches/CVE-2016-0701.patch: dropped, upstream.

openssl (1.0.2f-2) unstable; urgency=high

   * New upstream version.
     - Fixes CVE-2016-0701
     - Not affected by CVE-2015-3197 because SSLv2 is disabled.

openssl (1.0.2e-1ubuntu2) xenial; urgency=medium

   * SECURITY UPDATE: DH small subgroups issue
     - debian/patches/CVE-2016-0701.patch: add a test for small subgroup
       attacks in crypto/dh/dhtest.c, always generate DH keys for ephemeral
       DH cipher suites in doc/ssl/SSL_CTX_set_tmp_dh_callback.pod,
       ssl/s3_lib.c, ssl/s3_srvr.c, ssl/ssl.h, prevent small subgroup
       attacks on DH/DHE in crypto/dh/dh.h, crypto/dh/dh_check.c.
     - CVE-2016-0701

2015

openssl (1.0.2e-1ubuntu1) xenial; urgency=medium

   * Merge with Debian, remaining changes.
     - Disable SSLv3 without changing ABI:
       + debian/patches/no-sslv3.patch: Disable SSLv3 without using the
         no-ssl3-method option
       + debian/rules: don't use no-ssl3-method, don't bump soname
       + debian/patches/engines-path.patch: don't bump soname
       + debian/patches/version-script.patch: don't bump soname
       + debian/patches/soname.patch: removed
       + debian/lib*: don't bump soname
     - debian/control: don't enable rfc3779 and cms support for now as it
       changes ABI.
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i586 (on i386)
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
     - debian/rules: Enable optimized 64bit elliptic curve code contributed
       by Google.

openssl (1.0.2e-1) unstable; urgency=high

   * New upstream release
     - Fix CVE-2015-3193
     - Fix CVE-2015-3194
     - Fix CVE-2015-3195
     - Fix CVE-2015-3196
   * Remove all symlinks during clean
   * Run make depend after configure
   * Remove openssl_button.* from the doc package

openssl (1.0.2d-3) unstable; urgency=medium

   * Upload to unstable

openssl (1.0.2d-2) experimental; urgency=medium

   * Build with no-ssl3-method to remove all SSLv3 support.  This results in
     the functions SSLv3_method(), SSLv3_server_method() and
     SSLv3_client_method() being removed from libssl.  Change the soname as
     result of that and also changes name of the binary package.
     (Closes: #768476)
   * Enable rfc3779 and cms support (Closes: #630790)
   * Fix cross compilation for mips architectures. (Closes: #782492)

openssl (1.0.2d-1) unstable; urgency=high

   * New upstream version
     - Fixes CVE-2015-1793

openssl (1.0.2d-0ubuntu2) xenial; urgency=medium

   * debian/patches/no-sslv3.patch: Disable SSLv3 without using the
     no-ssl3-method option, as that changes ABI and we don't want to break
     compatibility with third party applications and applications built for
     older versions of Ubuntu, especially for an LTS release.

openssl (1.0.2d-0ubuntu1) wily; urgency=medium

   * SECURITY UPDATE: alternative chains certificate forgery
     - Updated to new upstream version
     - CVE-2015-1793

openssl (1.0.2c-1ubuntu1) wily; urgency=medium

   * Merge with Debian, remaining changes.
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i586 (on i386)
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
     - debian/rules: Enable optimized 64bit elliptic curve code contributed
       by Google.

openssl (1.0.2c-1) unstable; urgency=medium

   * New upstream version
     - Fixes ABI (Closes: #788511)

openssl (1.0.2b-1) unstable; urgency=high

   * New upstream version
     - Fix CVE-2015-4000
     - Fix CVE-2015-1788
     - Fix CVE-2015-1789
     - Fix CVE-2015-1790
     - Fix CVE-2015-1792
     - Fix CVE-2015-1791
   * Update c_rehash-compat.patch to make it apply to the new version.
   * Remove openssl-pod-misspell.patch applied upstream

openssl (1.0.2a-1ubuntu1) wily; urgency=medium

   * Merge with Debian, remaining changes.
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i586 (on i386)
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
     - debian/rules: Enable optimized 64bit elliptic curve code contributed
       by Google.
   * Dropped patches included in new version:
     - ppc64-support.patch, CVE-2014-0076.patch, CVE-2014-0160.patch,
       CVE-2010-5298.patch, CVE-2014-0198.patch, CVE-2014-0195.patch,
       CVE-2014-0221.patch, CVE-2014-0224-1.patch, CVE-2014-0224-2.patch,
       CVE-2014-3470.patch, CVE-2014-0224-3.patch,
       CVE-2014-0224-regression.patch, CVE-2014-0224-regression2.patch,
       CVE-2014-3505.patch, CVE-2014-3506.patch, CVE-2014-3507.patch,
       CVE-2014-3508.patch, CVE-2014-3509.patch, CVE-2014-3510.patch,
       CVE-2014-3511.patch, CVE-2014-3512.patch, CVE-2014-5139.patch,
       power8-optimisations.patch, tls_fallback_scsv_support.patch,
       CVE-2014-3513.patch, CVE-2014-3567.patch, CVE-2014-3568.patch,
       CVE-2014-3569.patch, CVE-2014-3570.patch, CVE-2014-3571-1.patch,
       CVE-2014-3571-2.patch, CVE-2014-3572.patch, CVE-2014-8275.patch,
       CVE-2015-0204.patch, CVE-2015-0205.patch, CVE-2015-0206.patch,
       CVE-2015-0209.patch, CVE-2015-0286.patch, CVE-2015-0287.patch,
       CVE-2015-0288.patch, CVE-2015-0289.patch, CVE-2015-0292.patch,
       CVE-2015-0293.patch, CVE-2015-0209-2.patch, CVE-2015-0293-2.patch

openssl (1.0.2a-1) unstable; urgency=medium

   * New upstrema version
     - Fix CVE-2015-0286
     - Fix CVE-2015-0287
     - Fix CVE-2015-0289
     - Fix CVE-2015-0293 (not affected, SSLv2 disabled)
     - Fix CVE-2015-0209
     - Fix CVE-2015-0288
     - Fix CVE-2015-0291
     - Fix CVE-2015-0290
     - Fix CVE-2015-0207
     - Fix CVE-2015-0208
     - Fix CVE-2015-1787
     - Fix CVE-2015-0285
   * Temporary enable SSLv3 methods again, but they will go away.
   * Don't set TERMIO anymore, use the default TERMIOS instead.

openssl (1.0.2-1) experimental; urgency=medium

   * New upstream release
     - Fixes CVE-2014-3571
     - Fixes CVE-2015-0206
     - Fixes CVE-2014-3569
     - Fixes CVE-2014-3572
     - Fixes CVE-2015-0204
     - Fixes CVE-2015-0205
     - Fixes CVE-2014-8275
     - Fixes CVE-2014-3570
     - Drop git_snapshot.patch
   * Drop gnu_source.patch, dgst_hmac.patch, stddef.patch,
     no_ssl3_method.patch: applied upstream
   * Update patches to apply

2014

openssl (1.0.2~beta3-1) experimental; urgency=low

   * New usptream beta version
   * Add git snapshot
   * Merge changes between 1.0.1h-3 and 1.0.1j-1:
     - Disables SSLv3 because of CVE-2014-3566
   * Drop patch rehash-crt.patch: partially applied upstream.
     c_rehash now doesn't support files in DER format anymore.
   * Drop patch rehash_pod.patch: applied upstream
   * Update c_rehash-compat.patch to apply to new upstream version.  This
     undoes upstream's "-old" option and creates both the new and old again.
     It now also does it for CRLs.
   * Drop defaults.patch, applied upstream
   * dgst_hmac.patch updated to apply to upstream version.
   * engines-path.patch updated to apply to upstream version.
   * Update list of exported symbols
   * Update symbols files to require beta3
   * Enable unit tests
   * Add patch to add support for the no-ssl3-method option that completly
     disable SSLv3 and pass the option.  This drops the following functions
     from the library: SSLv3_method, SSLv3_server_method and
     SSLv3_client_method
   * Build using OPENSSL_NO_BUF_FREELISTS

openssl (1.0.2~beta2-1) experimental; urgency=medium

   * New usptream beta version
     - Fix CVE-2014-0224
     - Fix CVE-2014-0221
     - Fix CVE-2014-0195
     - Fix CVE-2014-3470
     - Fix CVE-2014-0198
     - Fix CVE-2010-5298
     - Fix CVE-2014-0160
     - Fix CVE-2014-0076
   * Merge changes between 1.0.1f-1 and 1.0.1h-3:
     - postinst: Updated check for restarting services
   * libdoc-manpgs-pod-spell.patch and openssl-pod-misspell.patch
     partially applied upstream
   * Drop fix-pod-errors.patch, applied upstream.
   * Add support for ppc64le (Closes: #745657)
   * Add support for OpenRISC (Closes: #736772)

openssl (1.0.2~beta1-1) experimental; urgency=medium

   * New upstream beta version
     - Update list of symbols that should be exported and adjust the symbols
       file.  This also removes a bunch of duplicate symbols in the linker
       file.
     - Fix additional pod errors
     - Following patches have been applied upstream and are removed:
       libssl-misspell.patch, pod_req_misspell2.patch,
       pod_pksc12.misspell.patch, pod_s_server.misspell.patch,
       pod_x509setflags.misspell.patch, pod_ec.misspell.patch,
       pkcs12-doc.patch, req_bits.patch
     - Following patches have been partially applied upstream:
       libdoc-manpgs-pod-spell.patch, openssl-pod-misspell.patch
     - Remove openssl_fix_for_x32.patch, different patch applied upstream.
   * Add support for cross compiling (Closes: #465248)

openssl (1.0.1f-1ubuntu11) vivid; urgency=medium

   * SECURITY UPDATE: denial of service and possible memory corruption via
     malformed EC private key
     - debian/patches/CVE-2015-0209.patch: fix use after free in
       crypto/ec/ec_asn1.c.
     - debian/patches/CVE-2015-0209-2.patch: fix a failure to NULL a pointer
       freed on error in crypto/asn1/x_x509.c, crypto/ec/ec_asn1.c.
     - CVE-2015-0209
   * SECURITY UPDATE: denial of service via cert verification
     - debian/patches/CVE-2015-0286.patch: handle boolean types in
       crypto/asn1/a_type.c.
     - CVE-2015-0286
   * SECURITY UPDATE: ASN.1 structure reuse memory corruption
     - debian/patches/CVE-2015-0287.patch: free up structures in
       crypto/asn1/tasn_dec.c.
     - CVE-2015-0287
   * SECURITY UPDATE: denial of service via invalid certificate key
     - debian/patches/CVE-2015-0288.patch: check public key isn't NULL in
       crypto/x509/x509_req.c.
     - CVE-2015-0288
   * SECURITY UPDATE: denial of service and possible code execution via
     PKCS#7 parsing
     - debian/patches/CVE-2015-0289.patch: handle missing content in
       crypto/pkcs7/pk7_doit.c, crypto/pkcs7/pk7_lib.c.
     - CVE-2015-0289
   * SECURITY UPDATE: denial of service or memory corruption via base64
     decoding
     - debian/patches/CVE-2015-0292.patch: prevent underflow in
       crypto/evp/encode.c.
     - CVE-2015-0292
   * SECURITY UPDATE: denial of service via assert in SSLv2 servers
     - debian/patches/CVE-2015-0293.patch: check key lengths in
       ssl/s2_lib.c, ssl/s2_srvr.c.
     - debian/patches/CVE-2015-0293-2.patch: fix unsigned/signed warnings in
       ssl/s2_srvr.c.
     - CVE-2015-0293

openssl (1.0.1f-1ubuntu10) vivid; urgency=medium

   * SECURITY UPDATE: denial of service via unexpected handshake when
     no-ssl3 build option is used (not the default)
     - debian/patches/CVE-2014-3569.patch: keep the old method for now in
       ssl/s23_srvr.c.
     - CVE-2014-3569
   * SECURITY UPDATE: bignum squaring may produce incorrect results
     - debian/patches/CVE-2014-3570.patch: fix bignum logic in
       crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c,
       crypto/bn/bn_asm.c, removed crypto/bn/asm/mips3.s, added test to
       crypto/bn/bntest.c.
     - CVE-2014-3570
   * SECURITY UPDATE: DTLS segmentation fault in dtls1_get_record
     - debian/patches/CVE-2014-3571-1.patch: fix crash in ssl/d1_pkt.c,
       ssl/s3_pkt.c.
     - debian/patches/CVE-2014-3571-2.patch: make code more obvious in
       ssl/d1_pkt.c.
     - CVE-2014-3571
   * SECURITY UPDATE: ECDHE silently downgrades to ECDH [Client]
     - debian/patches/CVE-2014-3572.patch: don't skip server key exchange in
       ssl/s3_clnt.c.
     - CVE-2014-3572
   * SECURITY UPDATE: certificate fingerprints can be modified
     - debian/patches/CVE-2014-8275.patch: fix various fingerprint issues in
       crypto/asn1/a_bitstr.c, crypto/asn1/a_type.c, crypto/asn1/a_verify.c,
       crypto/asn1/asn1.h, crypto/asn1/asn1_err.c, crypto/asn1/x_algor.c,
       crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, crypto/x509/x509.h,
       crypto/x509/x_all.c.
     - CVE-2014-8275
   * SECURITY UPDATE: RSA silently downgrades to EXPORT_RSA [Client]
     - debian/patches/CVE-2015-0204.patch: only allow ephemeral RSA keys in
       export ciphersuites in ssl/d1_srvr.c, ssl/s3_clnt.c, ssl/s3_srvr.c,
       ssl/ssl.h, adjust documentation in doc/ssl/SSL_CTX_set_options.pod,
       doc/ssl/SSL_CTX_set_tmp_rsa_callback.pod.
     - CVE-2015-0204
   * SECURITY UPDATE: DH client certificates accepted without verification
     - debian/patches/CVE-2015-0205.patch: prevent use of DH client
       certificates without sending certificate verify message in
       ssl/s3_srvr.c.
     - CVE-2015-0205
   * SECURITY UPDATE: DTLS memory leak in dtls1_buffer_record
     - debian/patches/CVE-2015-0206.patch: properly handle failures in
       ssl/d1_pkt.c.
     - CVE-2015-0206

openssl (1.0.1f-1ubuntu9) utopic; urgency=medium

   * SECURITY UPDATE: denial of service via DTLS SRTP memory leak
     - debian/patches/CVE-2014-3513.patch: fix logic in ssl/d1_srtp.c,
       ssl/srtp.h, ssl/t1_lib.c, util/mk1mf.pl, util/mkdef.pl,
       util/ssleay.num.
     - CVE-2014-3513
   * SECURITY UPDATE: denial of service via session ticket integrity check
     memory leak
     - debian/patches/CVE-2014-3567.patch: perform cleanup in ssl/t1_lib.c.
     - CVE-2014-3567
   * SECURITY UPDATE: fix the no-ssl3 build option
     - debian/patches/CVE-2014-3568.patch: fix conditional code in
       ssl/s23_clnt.c, ssl/s23_srvr.c.
     - CVE-2014-3568
   * SECURITY IMPROVEMENT: Added TLS_FALLBACK_SCSV support to mitigate a
     protocol downgrade attack to SSLv3 that exposes the POODLE attack.
     - debian/patches/tls_fallback_scsv_support.patch: added support for
       TLS_FALLBACK_SCSV in apps/s_client.c, crypto/err/openssl.ec,
       ssl/d1_lib.c, ssl/dtls1.h, ssl/s23_clnt.c, ssl/s23_srvr.c,
       ssl/s2_lib.c, ssl/s3_enc.c, ssl/s3_lib.c, ssl/ssl.h, ssl/ssl3.h,
       ssl/ssl_err.c, ssl/ssl_lib.c, ssl/t1_enc.c, ssl/tls1.h,
       doc/apps/s_client.pod, doc/ssl/SSL_CTX_set_mode.pod.

openssl (1.0.1f-1ubuntu8) utopic; urgency=medium

   * Backport collected POWER8 optimisations from upstream (LP: #1290579).

openssl (1.0.1f-1ubuntu7) utopic; urgency=medium

   * SECURITY UPDATE: double free when processing DTLS packets
     - debian/patches/CVE-2014-3505.patch: fix double free in ssl/d1_both.c.
     - CVE-2014-3505
   * SECURITY UPDATE: DTLS memory exhaustion
     - debian/patches/CVE-2014-3506.patch: fix DTLS handshake message size
       checks in ssl/d1_both.c.
     - CVE-2014-3506
   * SECURITY UPDATE: DTLS memory leak from zero-length fragments
     - debian/patches/CVE-2014-3507.patch: fix memory leak and return codes
       in ssl/d1_both.c.
     - CVE-2014-3507
   * SECURITY UPDATE: information leak in pretty printing functions
     - debian/patches/CVE-2014-3508.patch: fix OID handling in
       crypto/asn1/a_object.c, crypto/objects/obj_dat.c.
     - CVE-2014-3508
   * SECURITY UPDATE: race condition in ssl_parse_serverhello_tlsext
     - debian/patches/CVE-2014-3509.patch: fix race in ssl/t1_lib.c.
     - CVE-2014-3509
   * SECURITY UPDATE: DTLS anonymous EC(DH) denial of service
     - debian/patches/CVE-2014-3510.patch: check for server certs in
       ssl/d1_clnt.c, ssl/s3_clnt.c.
     - CVE-2014-3510
   * SECURITY UPDATE: TLS protocol downgrade attack
     - debian/patches/CVE-2014-3511.patch: properly handle fragments in
       ssl/s23_srvr.c.
     - CVE-2014-3511
   * SECURITY UPDATE: SRP buffer overrun
     - debian/patches/CVE-2014-3512.patch: check parameters in
       crypto/srp/srp_lib.c.
     - CVE-2014-3512
   * SECURITY UPDATE: crash with SRP ciphersuite in Server Hello message
     - debian/patches/CVE-2014-5139.patch: fix SRP authentication and make
       sure ciphersuite is set up correctly in ssl/s3_clnt.c, ssl/ssl_lib.c,
       ssl/s3_lib.c, ssl/ssl.h, ssl/ssl_ciph.c, ssl/ssl_locl.h.
     - CVE-2014-5139

openssl (1.0.1f-1ubuntu6) utopic; urgency=medium

   * SECURITY UPDATE: regression with certain renegotiations (LP: #1332643)
     - debian/patches/CVE-2014-0224-regression2.patch: accept CCS after
       sending finished ssl/s3_clnt.c.

openssl (1.0.1f-1ubuntu5) utopic; urgency=medium

   * SECURITY UPDATE: regression with tls_session_secret_cb (LP: #1329297)
     - debian/patches/CVE-2014-0224.patch: set the CCS_OK flag when using
       tls_session_secret_cb for session resumption in ssl/s3_clnt.c.

openssl (1.0.1f-1ubuntu4) utopic; urgency=medium

   * SECURITY UPDATE: arbitrary code execution via DTLS invalid fragment
     - debian/patches/CVE-2014-0195.patch: add consistency check for DTLS
       fragments in ssl/d1_both.c.
     - CVE-2014-0195
   * SECURITY UPDATE: denial of service via DTLS recursion flaw
     - debian/patches/CVE-2014-0221.patch: handle DTLS hello request without
       recursion in ssl/d1_both.c.
     - CVE-2014-0221
   * SECURITY UPDATE: MITM via change cipher spec
     - debian/patches/CVE-2014-0224-1.patch: only accept change cipher spec
       when it is expected in ssl/s3_clnt.c, ssl/s3_pkt.c, ssl/s3_srvr.c,
       ssl/ssl3.h.
     - debian/patches/CVE-2014-0224-2.patch: don't accept zero length master
       secrets in ssl/s3_pkt.c.
     - debian/patches/CVE-2014-0224-3.patch: allow CCS after resumption in
       ssl/s3_clnt.c.
     - CVE-2014-0224
   * SECURITY UPDATE: denial of service via ECDH null session cert
     - debian/patches/CVE-2014-3470.patch: check session_cert is not NULL
       before dereferencing it in ssl/s3_clnt.c.
     - CVE-2014-3470

openssl (1.0.1f-1ubuntu3) utopic; urgency=medium

   * SECURITY UPDATE: denial of service via use after free
     - debian/patches/CVE-2010-5298.patch: check s->s3->rbuf.left before
       releasing buffers in ssl/s3_pkt.c.
     - CVE-2010-5298
   * SECURITY UPDATE: denial of service via null pointer dereference
     - debian/patches/CVE-2014-0198.patch: if buffer was released, get a new
       one in ssl/s3_pkt.c.
     - CVE-2014-0198

openssl (1.0.1f-1ubuntu2) trusty; urgency=medium

   * SECURITY UPDATE: side-channel attack on Montgomery ladder implementation
     - debian/patches/CVE-2014-0076.patch: add and use constant time swap in
       crypto/bn/bn.h, crypto/bn/bn_lib.c, crypto/ec/ec2_mult.c,
       util/libeay.num.
     - CVE-2014-0076
   * SECURITY UPDATE: memory disclosure in TLS heartbeat extension
     - debian/patches/CVE-2014-0160.patch: use correct lengths in
       ssl/d1_both.c, ssl/t1_lib.c.
     - CVE-2014-0160

openssl (1.0.1f-1ubuntu1) trusty; urgency=low

   * Merge with Debian, remaining changes.
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i586 (on i386)
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
     - debian/patches/ubuntu_deb676533_arm_asm.patch: Enable arm assembly
       code.
     - debian/rules: Enable optimized 64bit elliptic curve code contributed
       by Google.
   * Dropped changes:
     - debian/patches/arm64-support: included in debian-targets.patch
     - debian/patches/no_default_rdrand.patch: upstream
     - debian/patches/openssl-1.0.1e-env-zlib.patch: zlib is now completely
       disabled in debian/rules

openssl (1.0.1f-1) unstable; urgency=high

   * New upstream version
     - Fix for TLS record tampering bug CVE-2013-4353
     - Drop the snapshot patch
   * update watch file to check for upstream signature and add upstream pgp key.
   * Drop conflicts against openssh since we now on a released version again.

2013

openssl (1.0.1e-6) unstable; urgency=medium

   * Add Breaks: openssh-client (<< 1:6.4p1-1.1), openssh-server (<<
     1:6.4p1-1.1).  This is to prevent people running into #732940.
     This Breaks can be removed again when we stop using a git snapshot.

openssl (1.0.1e-5) unstable; urgency=low

   * Change default digest to SHA256 instead of SHA1.  (Closes: #694738)
   * Drop support for multiple certificates in 1 file.  It never worked
     properly in the first place, and the only one shipping in
     ca-certificates has been split.
   * Fix libdoc-manpgs-pod-spell.patch to only fix spalling errors
   * Remove make-targets.patch.  It prevented the test dir from being cleaned.
   * Update to a git snapshot of the OpenSSL_1_0_1-stable branch.
     - Fixes CVE-2013-6449 (Closes: #732754)
     - Fixes CVE-2013-6450
     - Drop patches ssltest_no_sslv2.patch cpuid.patch aesni-mac.patch
       dtls_version.patch get_certificate.patch, since they where all
       already commited upstream.
     - adjust fix-pod-errors.patch for the reordering of items in the
       documentation they've done trying to fix those pod errors.
     - disable rdrand engine by default (Closes: #732710)
   * disable zlib support.  Fixes CVE-2012-4929 (Closes: #728055)
   * Add arm64 support (Closes: #732348)
   * Properly use the default number of bits in req when none are given

openssl (1.0.1e-4ubuntu4) trusty; urgency=low

   * debian/patches/no_default_rdrand.patch: Don't use rdrand engine as
     default unless explicitly requested.

openssl (1.0.1e-4ubuntu3) trusty; urgency=medium

   * Update debian configuration.

openssl (1.0.1e-4ubuntu2) trusty; urgency=low

   * Re-enable full TLSv1.2 support (LP: #1257877)
     - debian/patches/tls12_workarounds.patch: disable patch to re-enable
       full TLSv1.2 support. Most problematic sites have been fixed now, and
       we really want proper TLSv1.2 support in an LTS.

openssl (1.0.1e-4ubuntu1) trusty; urgency=low

   * Merge with Debian; remaining changes same as in 1.0.1e-3ubuntu1.

openssl (1.0.1e-4) unstable; urgency=low

   [ Peter Michael Green ]
   * Fix pod errors (Closes: #723954)
   * Fix clean target
 
   [ Kurt Roeckx ]
   * Add mipsn32 and mips64 targets.  Patch from Eleanor Chen
     <chenyueg@gmail.com>  (Closes: #720654)
   * Add support for nocheck in DEB_BUILD_OPTIONS
   * Update Norwegian translation (Closes: #653574)
   * Update description of the packages.  Patch by Justin B Rye
     (Closes: #719262)
   * change to debhelper compat level 9:
     - change dh_strip call so only the files from libssl1.0.0 get debug
       symbols.
     - change dh_makeshlibs call so the engines don't get added to the
       shlibs
   * Update Standards-Version from 3.8.0 to 3.9.5.  No changes required.

openssl (1.0.1e-3ubuntu1) saucy; urgency=low

   * Merge with Debian, remaining changes.
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i586 (on i386)
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - Unapply patch c_rehash-multi and comment it out in the series as it
       breaks parsing of certificates with CRLF line endings and other cases
       (see Debian #642314 for discussion), it also changes the semantics of
       c_rehash directories by requiring applications to parse hash link
       targets as files containing potentially multiple certificates rather
       than exactly one.
     - debian/patches/tls12_workarounds.patch: Workaround large client hello
       issues when TLS 1.1 and lower is in use
     - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
     - debian/patches/ubuntu_deb676533_arm_asm.patch: Enable arm assembly
       code.
     - debian/patches/arm64-support: Add basic arm64 support (no assembler)
     - debian/rules: Enable optimized 64bit elliptic curve code contributed
       by Google.
   * debian/patches/tls12_workarounds.patch: updated to also disable TLS 1.2
     in test suite since we disable it in the client.
   * Disable compression to avoid CRIME systemwide (CVE-2012-4929).
   * Dropped changes:
     - debian/patches/ubuntu_deb676533_arm_asm.patch, applied in Debian.

openssl (1.0.1e-3) unstable; urgency=low

   * Move <openssl/opensslconf.h> to /usr/include/$(DEB_HOST_MULTIARCH), and
     mark libssl-dev Multi-Arch: same.
     Patch by Colin Watson <cjwatson@ubuntu.com> (Closes: #689093)
   * Add Polish translation (Closes: #658162)
   * Add Turkish translation (Closes: #660971)
   * Enable assembler for the arm targets, and remove armeb.
     Patch by Riku Voipio <riku.voipio@iki.fi> (Closes: #676533)
   * Add support for x32 (Closes: #698406)
   * enable ec_nistp_64_gcc_128 on *-amd64 (Closes: #698447)

openssl (1.0.1e-2ubuntu1.1) saucy-security; urgency=low

   * SECURITY UPDATE: Disable compression to avoid CRIME systemwide
     (LP: #1187195)
     - CVE-2012-4929
     - debian/patches/openssl-1.0.1e-env-zlib.patch: disable default use of
       zlib to compress SSL/TLS unless the environment variable
       OPENSSL_DEFAULT_ZLIB is set in the environment during library
       initialization.
     - Introduced to assist with programs not yet updated to provide their own
       controls on compression, such as Postfix
     - http://pkgs.fedoraproject.org/cgit/openssl.git/plain/openssl-1.0.1e-env-zlib.patch

openssl (1.0.1e-2ubuntu1) saucy; urgency=low

   * Resynchronise with Debian unstable.  Remaining changes:
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i586 (on i386)
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - Unapply patch c_rehash-multi and comment it out in the series as it
       breaks parsing of certificates with CRLF line endings and other cases
       (see Debian #642314 for discussion), it also changes the semantics of
       c_rehash directories by requiring applications to parse hash link
       targets as files containing potentially multiple certificates rather
       than exactly one.
     - debian/patches/tls12_workarounds.patch: Workaround large client hello
       issues when TLS 1.1 and lower is in use
     - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
     - debian/patches/ubuntu_deb676533_arm_asm.patch: Enable arm assembly
       code.
     - debian/patches/arm64-support: Add basic arm64 support (no assembler)
     - debian/rules: Enable optimized 64bit elliptic curve code contributed
       by Google.
   * debian/patches/tls12_workarounds.patch: updated to also disable TLS 1.2
     in test suite since we disable it in the client.
   * Dropped changes:
     - debian/patches/CVE-2013-0169.patch: upstream.
     - debian/patches/fix_key_decoding_deadlock.patch: upstream.
     - debian/patches/CVE-2013-0166.patch: upstream.

openssl (1.0.1e-2) unstable; urgency=high

   * Bump shlibs.  It's needed for the udeb.
   * Make cpuid work on cpu's that don't set ecx (Closes: #699692)
   * Fix problem with AES-NI causing bad record mac (Closes: #701868, #702635, #678353)
   * Fix problem with DTLS version check (Closes: #701826)
   * Fix segfault in SSL_get_certificate (Closes: #703031)

openssl (1.0.1e-1) unstable; urgency=high

   * New upstream version (Closes: #699889)
     - Fixes CVE-2013-0169, CVE-2012-2686, CVE-2013-0166
     - Drop renegiotate_tls.patch, applied upstream
     - Export new CRYPTO_memcmp symbol, update symbol file
   * Add ssltest_no_sslv2.patch so that "make test" works.

2012

openssl (1.0.1c-5) unstable; urgency=low

   * Re-enable assembler versions on sparc.  They shouldn't have
     been disabled for sparc v9.  (Closes: #649841)

openssl (1.0.1c-4ubuntu8) raring; urgency=low

   * SECURITY UPDATE: "Lucky Thirteen" timing side-channel TLS attack
     - debian/patches/CVE-2013-0169.patch: re-enabled patch and added extra
       commit from upstream to fix regression.
     - CVE-2013-0169

openssl (1.0.1c-4ubuntu7) raring; urgency=low

   * Enable optimized 64bit elliptic curve code contributed by Google. (LP: #1018522)

openssl (1.0.1c-4ubuntu6) raring; urgency=low

   * debian/patches/fix_key_decoding_deadlock.patch: Fix possible deadlock
     when decoding public keys. (LP: #1066032)

openssl (1.0.1c-4ubuntu5) raring; urgency=low

   * REGRESSION FIX: decryption errors on AES-NI hardware (LP: #1134873,
     LP: #1133333)
     - debian/patches/CVE-2013-0169.patch: disabled for now until fix is
       available from upstream.

openssl (1.0.1c-4ubuntu4) raring; urgency=low

   * SECURITY UPDATE: denial of service via invalid OCSP key
     - debian/patches/CVE-2013-0166.patch: properly handle NULL key in
       crypto/asn1/a_verify.c, crypto/ocsp/ocsp_vfy.c.
     - CVE-2013-0166
   * SECURITY UPDATE: "Lucky Thirteen" timing side-channel TLS attack
     - debian/patches/CVE-2013-0169.patch: massive code changes
     - CVE-2013-0169
   * SECURITY UPDATE: denial of service via AES-NI and crafted CBC data
     - Fix included in CVE-2013-0169 patch
     - CVE-2012-2686

openssl (1.0.1c-4ubuntu3) raring; urgency=low

   * Add basic arm64 support (no assembler) (LP: #1102107)

openssl (1.0.1c-4ubuntu2) raring; urgency=low

   * Enable arm assembly code. (LP: #1083498) (Closes: #676533)

openssl (1.0.1c-4ubuntu1) raring; urgency=low

   * Resynchronise with Debian (LP: #1077228).  Remaining changes:
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i586 (on i386)
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - Unapply patch c_rehash-multi and comment it out in the series as it
       breaks parsing of certificates with CRLF line endings and other cases
       (see Debian #642314 for discussion), it also changes the semantics of
       c_rehash directories by requiring applications to parse hash link
       targets as files containing potentially multiple certificates rather
       than exactly one.
     - Bump version passed to dh_makeshlibs to 1.0.1 for new symbols.
     - debian/patches/tls12_workarounds.patch: Workaround large client hello
       issues when TLS 1.1 and lower is in use
     - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
   * Dropped changes:
     - Drop openssl-doc in favour of the libssl-doc package introduced by
       Debian.  Add Conflicts/Replaces until the next LTS release.
       + Drop the Conflicts/Replaces because 12.04 LTS was 'the next LTS
         release'

openssl (1.0.1c-4) unstable; urgency=low

   * Fix the configure rules for alpha (Closes: #672710)
   * Switch the postinst to sh again, there never was a reason to
     switch it to bash (Closes: #676398)
   * Fix pic.patch to not use #ifdef in x86cpuid.s, only .S files are
     preprocessed.  We generate the file again for pic anyway.
     (Closes: #677468)
   * Drop Breaks against openssh as it was only for upgrades
     between versions that were only in testing/unstable.
     (Closes: #668600)

openssl (1.0.1c-3ubuntu2) quantal; urgency=low

   [ Tyler Hicks <tyhicks@canonical.com> ]
   * debian/patches/tls12_workarounds.patch: Readd the change to check
     TLS1_get_client_version rather than TLS1_get_version to fix incorrect
     client hello cipher list truncation when TLS 1.1 and lower is in use.
     (LP: #1051892)
 
   [ Micah Gersten <micahg@ubuntu.com> ]
   * Mark Debian Vcs-* as XS-Debian-Vcs-*
     - update debian/control

openssl (1.0.1c-3ubuntu1) quantal; urgency=low

   * Resynchronise with Debian. Remaining changes:
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i586 (on i386)
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - Unapply patch c_rehash-multi and comment it out in the series as it
       breaks parsing of certificates with CRLF line endings and other cases
       (see Debian #642314 for discussion), it also changes the semantics of
       c_rehash directories by requiring applications to parse hash link
       targets as files containing potentially multiple certificates rather
       than exactly one.
     - Bump version passed to dh_makeshlibs to 1.0.1 for new symbols.
     - debian/patches/tls12_workarounds.patch: workaround large client hello
       issue: Compile with -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 and
       with -DOPENSSL_NO_TLS1_2_CLIENT.
   * Dropped upstreamed patches:
     - debian/patches/CVE-2012-2110.patch
     - debian/patches/CVE-2012-2110b.patch
     - debian/patches/CVE-2012-2333.patch
     - debian/patches/CVE-2012-0884-extra.patch
     - most of debian/patches/tls12_workarounds.patch

openssl (1.0.1c-3) unstable; urgency=low

   * Disable padlock engine again, causes problems for hosts not supporting it.

openssl (1.0.1c-2) unstable; urgency=high

   * Fix renegiotation when using TLS > 1.0.  This breaks tor.  Patch from
     upstream.  (Closes: #675990)
   * Enable the padlock engine by default.
   * Change default bits from 1024 to 2048 (Closes: #487152)

openssl (1.0.1c-1) unstable; urgency=high

   * New upstream version
     - Fixes CVE-2012-2333 (Closes: #672452)

openssl (1.0.1b-1) unstable; urgency=high

   * New upstream version
     - Remaps SSL_OP_NO_TLSv1_1, so applications linked to 1.0.0
       can talk to servers supporting TLS 1.1 but not TLS 1.2
     - Drop rc4_hmac_md5.patch, applied upstream

openssl (1.0.1a-3) unstable; urgency=low

   * Use patch from upstream for the rc4_hmac_md5 issue.

openssl (1.0.1a-2) unstable; urgency=low

   * Fix rc4_hmac_md5 on non-i386/amd64 arches.

openssl (1.0.1a-1) unstable; urgency=high

   * New upstream version
     - Fixes CVE-2012-2110
     - Fix crash in rc4_hmac_md5 (Closes: #666405)
     - Fixes some issues with talking to other servers when TLS 1.1 and 1.2 is
       supported
     - Drop patches no_ssl2.patch vpaes.patch tls1.2_client_algorithms.patch,
       applied upstream.

openssl (1.0.1-4ubuntu6) quantal; urgency=low

   * SECURITY UPDATE: denial of service attack in DTLS, TLS v1.1 and
     TLS v1.2 implementation
     - debian/patches/CVE_2012-2333.patch: guard for integer overflow
       before skipping explicit IV
     - CVE-2012-2333
   * debian/patches/CVE-2012-0884-extra.patch: initialize tkeylen
     properly when encrypting CMS messages.

openssl (1.0.1-4ubuntu5) precise-proposed; urgency=low

   * debian/patches/CVE-2012-2110b.patch: Use correct error code in
     BUF_MEM_grow_clean()

openssl (1.0.1-4ubuntu4) precise-proposed; urgency=low

   * Check TLS1_get_client_version rather than TLS1_get_version for client
     hello cipher list truncation, in a further attempt to get things working
     again for everyone (LP: #986147).

openssl (1.0.1-4ubuntu3) precise-proposed; urgency=low

   * SECURITY UPDATE: fix various overflows
     - debian/patches/CVE-2012-2110.patch: adjust crypto/a_d2i_fp.c,
       crypto/buffer.c and crypto/mem.c to verify size of lengths
     - CVE-2012-2110

openssl (1.0.1-4ubuntu2) precise-proposed; urgency=low

   * Backport more upstream patches to work around TLS 1.2 failures
     (LP #965371):
     - Do not use record version number > TLS 1.0 in initial client hello:
       some (but not all) hanging servers will now work.
     - Truncate the number of ciphers sent in the client hello to 50.  Most
       broken servers should now work.
     - Don't allow TLS 1.2 SHA-256 ciphersuites in TLS 1.0, 1.1 connections.
   * Don't re-enable TLS 1.2 client support by default yet, since more of the
     sites listed in the above bug and its duplicates still fail if I do that
     versus leaving it disabled.

openssl (1.0.1-4ubuntu1) precise; urgency=low

   * Resynchronise with Debian (LP: #968753).  Remaining changes:
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i586 (on i386)
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - Unapply patch c_rehash-multi and comment it out in the series as it
       breaks parsing of certificates with CRLF line endings and other cases
       (see Debian #642314 for discussion), it also changes the semantics of
       c_rehash directories by requiring applications to parse hash link
       targets as files containing potentially multiple certificates rather
       than exactly one.
     - Bump version passed to dh_makeshlibs to 1.0.1 for new symbols.
     - Experimental workaround to large client hello issue: if
       OPENSSL_NO_TLS1_2_CLIENT is set then TLS v1.2 is disabled for clients
       only.
     - Compile with -DOPENSSL_NO_TLS1_2_CLIENT.

openssl (1.0.1-4) unstable; urgency=low

   * Use official patch for the vpaes problem, also covering amd64.

openssl (1.0.1-3) unstable; urgency=high

   * Fix crash in vpaes (Closes: #665836)
   * use client version when deciding whether to send supported signature
     algorithms extension

openssl (1.0.1-2ubuntu4) precise; urgency=low

   * Pass cross-compiling options to 'make install' as well, since apparently
     it likes to rebuild fips_premain_dso.

openssl (1.0.1-2ubuntu3) precise; urgency=low

   * Temporarily work around TLS 1.2 failures as suggested by upstream
     (LP #965371):
     - Use client version when deciding whether to send supported signature
       algorithms extension.
     - Experimental workaround to large client hello issue: if
       OPENSSL_NO_TLS1_2_CLIENT is set then TLS v1.2 is disabled for clients
       only.
     - Compile with -DOPENSSL_NO_TLS1_2_CLIENT.
     This fixes most of the reported problems, but does not fix the case of
     servers that reject version numbers they don't support rather than
     trying to negotiate a lower version (e.g. www.mediafire.com).

openssl (1.0.1-2ubuntu2) precise; urgency=low

   * Remove compat symlinks from /usr/lib to /lib, as they cause
     some serious issued with symbol generation, and are not needed.
   * Bump version passed to dh_makeshlibs to 1.0.1 for new symbols.

openssl (1.0.1-2ubuntu1) precise; urgency=low

   * Resynchronise with Debian (LP: #958430).  Remaining changes:
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i586 (on i386)
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - Unapply patch c_rehash-multi and comment it out in the series as it
       breaks parsing of certificates with CRLF line endings and other cases
       (see Debian #642314 for discussion), it also changes the semantics of
       c_rehash directories by requiring applications to parse hash link
       targets as files containing potentially multiple certificates rather
       than exactly one.
   * Drop aesni.patch, applied upstream.
   * Drop Bsymbolic-functions.patch, now handled using dpkg-buildflags.

openssl (1.0.1-2) unstable; urgency=low

   * Properly quote the new cflags in Configure

openssl (1.0.1-1) unstable; urgency=low

   * New upstream version
     - Remove kfreebsd-pipe.patch, fixed upstream
     - Update pic.patch, openssl-pod-misspell.patch and make-targets.patch
     - Add OPENSSL_1.0.1 to version-script.patch and libssl1.0.0.symbols for
       the new functions.
     - AES-NI support (Closes: #644743)
   * pic.patch: upstream made OPENSSL_ia32cap_P and OPENSSL_cpuid_setup
     hidden on amd64, no need to access it PIC anymore.
   * pic.patch: Make OPENSSL_ia32cap_P hidden on i386 too (Closes: #663977)
   * Enable hardening using dpkg-buildflags (Closes: #653495)
   * s_client and s_server were forcing SSLv3 only connection when SSLv2 was
     disabled instead of the SSLv2 with upgrade method.  (Closes: #664454)
   * Add Breaks on openssh < 1:5.9p1-4, it has a too strict version check.

openssl (1.0.0h-1) unstable; urgency=high

   * New upstream version
     - Fixes CVE-2012-0884
     - Fixes CVE-2012-1165
     - Properly fix CVE-2011-4619
     - pkg-config.patch applied upstream, remove it.
   * Enable assembler for all i386 arches.  The assembler does proper
     detection of CPU support, including cpuid support.
     This should fix a problem with AES 192 and 256 with the padlock
     engine because of the difference in NO_ASM between the between
     the i686 optimized library and the engine.

openssl (1.0.0g-1ubuntu1) precise; urgency=low

   * Resynchronise with Debian. Remaining changes:
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/aesni.patch: Backport Intel AES-NI support, now from
       http://rt.openssl.org/Ticket/Display.html?id=2065 rather than the
       0.9.8 variant.
     - debian/patches/Bsymbolic-functions.patch: Link using
       -Bsymbolic-functions.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i586 (on i386)
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - Unapply patch c_rehash-multi and comment it out in the series as it
       breaks parsing of certificates with CRLF line endings and other cases
       (see Debian #642314 for discussion), it also changes the semantics of
       c_rehash directories by requiring applications to parse hash link
       targets as files containing potentially multiple certificates
       rather than exactly one.

openssl (1.0.0g-1) unstable; urgency=high

   * New upstream version
     - Fixes CVE-2012-0050

openssl (1.0.0f-1) unstable; urgency=high

   * New upstream version
     - Fixes CVE-2011-4108, CVE-2011-4576, CVE-2011-4619, CVE-2012-0027,
       CVE-2011-4577

openssl (1.0.0e-3ubuntu1) precise; urgency=low

   * Resynchronise with Debian. Remaining changes:
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification on libssl1.0.0
         upgrade on servers.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/aesni.patch: Backport Intel AES-NI support, now from
       http://rt.openssl.org/Ticket/Display.html?id=2065 rather than the
       0.9.8 variant.
     - debian/patches/Bsymbolic-functions.patch: Link using
       -Bsymbolic-functions.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i586 (on i386)
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
     - Unapply patch c_rehash-multi and comment it out in the series as it
       breaks parsing of certificates with CRLF line endings and other cases
       (see Debian #642314 for discussion), it also changes the semantics of
       c_rehash directories by requiring applications to parse hash link
       targets as files containing potentially multiple certificates
       rather than exactly one.

2011

openssl (1.0.0e-3) unstable; urgency=low

   * Don't build v8 and v9 variants of sparc anymore, they're older than
     the default.  (Closes: #649841)
   * Don't build i486 optimized version, that's the default anyway, and
     it uses assembler that doesn't always work on i486.

openssl (1.0.0e-2.1) unstable; urgency=high

   * Non-maintainer upload by the Security Team.
   * Block Malaysian's Digicert Sdn. Bhd. certificates by marking them
     as revoked.

openssl (1.0.0e-2ubuntu4) oneiric; urgency=low

   * The previous change moved the notification to major upgrades only, but
     in fact, we do want the sysadmin to be notified when security updates
     are installed, without having services automatically restarted.
     (LP: #244250)

openssl (1.0.0e-2ubuntu3) oneiric; urgency=low

   * Only issue a restart required notification on important upgrades, and
     not other actions such as reconfiguration or initial installation.
     (LP: #244250)

openssl (1.0.0e-2ubuntu2) oneiric; urgency=low

   * Unapply patch c_rehash-multi and comment it out in the series as it breaks
     parsing of certificates with CRLF line endings and other cases (see
     Debian #642314 for discussion), it also changes the semantics of c_rehash
     directories by requiring applications to parse hash link targets as files
     containing potentially multiple certificates rather than exactly one.
     LP: #855454.

openssl (1.0.0e-2ubuntu1) oneiric; urgency=low

   * Resynchronise with Debian, fixes CVE-2011-1945, CVE-2011-3207 and
     CVE-2011-3210 (LP: #850608). Remaining changes:
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification bubble on libssl1.0.0
         upgrade.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/aesni.patch: Backport Intel AES-NI support, now from
       http://rt.openssl.org/Ticket/Display.html?id=2065 rather than the
       0.9.8 variant.
     - debian/patches/Bsymbolic-functions.patch: Link using
       -Bsymbolic-functions.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i486, i586 (on
         i386), v8 (on sparc).
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
   * debian/libssl1.0.0.postinst: only display restart notification on
     servers (LP: #244250)

openssl (1.0.0e-2) unstable; urgency=low

   * Add a missing $(DEB_HOST_MULTIARCH)

openssl (1.0.0e-1) unstable; urgency=low

   * New upstream version
     - Fix bug where CRLs with nextUpdate in the past are sometimes accepted
       by initialising X509_STORE_CTX properly. (CVE-2011-3207)
     - Fix SSL memory handling for (EC)DH ciphersuites, in particular
       for multi-threaded use of ECDH. (CVE-2011-3210)
     - Add protection against ECDSA timing attacks (CVE-2011-1945)
   * Block DigiNotar certifiates.  Patch from
     Raphael Geissert <geissert@debian.org>
   * Generate hashes for all certs in a file (Closes: #628780, #594524)
     Patch from Klaus Ethgen <Klaus@Ethgen.de>
   * Add multiarch support (Closs: #638137)
     Patch from Steve Langasek / Ubuntu
   * Symbols from the gost engine were removed because it didn't have
     a linker file.  Thanks to Roman I Khimov <khimov@altell.ru>
     (Closes: #631503)
   * Add support for s390x.  Patch from Aurelien Jarno <aurel32@debian.org>
     (Closes: #641100)
   * Add build-arch and build-indep targets to the rules file.

openssl (1.0.0d-3) unstable; urgency=low

   * Make it build on sparc64.  Patch from Aurelien Jarno.  (Closes: #626060)
   * Apply patches from Scott Schaefer <saschaefer@neurodiverse.org> to
     fix various pod and spelling errors. (Closes: #622820, #605561)
   * Add missing symbols for the engines (Closes: #623038)
   * More spelling fixes from Scott Schaefer (Closes: #395424)
   * Patch from Scott Schaefer to better document pkcs12 password options
     (Closes: #462489)
   * Document dgst -hmac option.  Patch by Thorsten Glaser <tg@mirbsd.de>
     (Closes: #529586)

openssl (1.0.0d-2ubuntu2) oneiric; urgency=low

   * Build for multiarch.  LP: #826601.

openssl (1.0.0d-2ubuntu1) oneiric; urgency=low

   * Resynchronise with Debian (LP: #675566).  Remaining changes:
     - debian/libssl1.0.0.postinst:
       + Display a system restart required notification bubble on libssl1.0.0
         upgrade.
       + Use a different priority for libssl1.0.0/restart-services depending
         on whether a desktop, or server dist-upgrade is being performed.
     - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
       libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
       in Debian).
     - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
       rules}: Move runtime libraries to /lib, for the benefit of
       wpasupplicant.
     - debian/patches/aesni.patch: Backport Intel AES-NI support, now from
       http://rt.openssl.org/Ticket/Display.html?id=2065 rather than the
       0.9.8 variant.
     - debian/patches/Bsymbolic-functions.patch: Link using
       -Bsymbolic-functions.
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
       .pc.
     - debian/rules:
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building.  Patch from Neil Williams.
       + Don't build for processors no longer supported: i486, i586 (on
         i386), v8 (on sparc).
       + Fix Makefile to properly clean up libs/ dirs in clean target.
       + Replace duplicate files in the doc directory with symlinks.
   * Update architectures affected by Bsymbolic-functions.patch.
   * Drop debian/patches/no-sslv2.patch; Debian now adds the 'no-ssl2'
     configure option, which compiles out SSLv2 support entirely, so this is
     no longer needed.
   * Drop openssl-doc in favour of the libssl-doc package introduced by
     Debian.  Add Conflicts/Replaces until the next LTS release.

openssl (1.0.0d-2) unstable; urgency=high

   * Make c_rehash also generate the old subject hash.  Gnutls applications
     seem to require it.  (Closes: #611102)

openssl (1.0.0d-1) unstable; urgency=low

   * New upstream version
     - Fixes CVE-2011-0014
   * Make libssl-doc Replaces/Breaks with old libssl-dev packages
     (Closes: #607609)
   * Only export the symbols we should, instead of all.
   * Add symbol file.
   * Upload to unstable

2010

openssl (1.0.0c-2) experimental; urgency=low

   * Set $ in front of {sparcv9_asm} so that the sparc v9 variant builds.
   * Always define _GNU_SOURCE, not only for Linux.
   * Drop SSL2 support (Closes: #589706)

openssl (1.0.0c-1) experimental; urgency=low

   * New upstream version (Closes: #578376)
     - New soname: Rename library packages
     - Drop patch perl-path.diff, not needed anymore
     - Drop patches CVE-2010-2939.patch, CVE-2010-3864.patch
       and CVE-2010-4180.patch: applied upstream.
     - Update Configure for the new fields for the assembler options
       per arch.  alpha now makes use of assembler.
   * Move man3 manpages and demos to libssl-doc (Closes: #470594)
   * Drop .pod files from openssl package (Closes: #518167)
   * Don't use RC4_CHAR on amd64 and drop rc4-amd64.patch
   * Stop using BF_PTR2 on (kfreebd-)amd64.
   * Drop debian-arm from the list of arches.
   * Update arm arches to use BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL
     BF_PTR instead of BN_LLONG DES_RISC1
   * ia64: Drop RC4_CHAR, add DES_UNROLL DES_INT
   * powerpc: Use RC4_CHAR RC4_CHUNK DES_RISC1 instead
     of DES_RISC2 DES_PTR MD2_CHAR RC4_INDEX
   * s390: Use RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL instead of BN_LLONG

openssl (0.9.8o-5ubuntu1) natty; urgency=low

   * Merge from debian unstable.  Remaining changes: (LP: #718205)
     - d/libssl0.9.8.postinst:
       + Display a system restart required notification bubble
         on libssl0.9.8 upgrade.
       + Use a different priority for libssl0.9.8/restart-services
         depending on whether a desktop, or server dist-upgrade
         is being performed.
     - d/{libssl0.9.8-udeb.dirs, control, rules}: Create
       libssl0.9.8-udeb, for the benefit of wget-udeb (no wget-udeb
       package in Debian).
     - d/{libcrypto0.9.8-udeb.dirs, libssl0.9.8.dirs, libssl0.9.8.files,
       rules}: Move runtime libraries to /lib, for the benefit of wpasupplicant.
     - d/{control, openssl-doc.docs, openssl.docs, openssl.dirs}:
       + Ship documentation in openssl-doc, suggested by the package.
        (Closes: #470594)
     - d/p/aesni.patch: Backport Intel AES-NI support from
       http://rt.openssl.org/Ticket/Display.html?id=2067 (refreshed)
     - d/p/Bsymbolic-functions.patch: Link using -Bsymbolic-functions.
     - d/p/perlpath-quilt.patch: Don't change perl #! paths under .pc.
     - d/p/no-sslv2.patch: Disable SSLv2 to match NSS and GnuTLS.
       The protocol is unsafe and extremely deprecated. (Closes: #589706)
     - d/rules:
       + Disable SSLv2 during compile. (Closes: #589706)
       + Don't run 'make test' when cross-building.
       + Use host compiler when cross-building. Patch from Neil Williams.
         (Closes: #465248)
       + Don't build for processors no longer supported: i486, i586
         (on i386), v8 (on sparc).
       + Fix Makefile to properly clean up libs/ dirs in clean target.
         (Closes: #611667)
       + Replace duplicate files in the doc directory with symlinks.
   * This upload fixed CVE: (LP: #718208)
     - CVE-2011-0014

openssl (0.9.8o-5) unstable; urgency=low

   * Fix OCSP stapling parse error (CVE-2011-0014)

openssl (0.9.8o-4ubuntu2) natty; urgency=low

   [ Peter Pearse ]
   * Fix Makefile to properly clean up libs/ dirs in clean target

openssl (0.9.8o-4ubuntu1) natty; urgency=low

   * Merge from debian unstable.  Remaining changes: (LP: #693902)
     - debian/patches/Bsymbolic-functions.patch: Link using
       -Bsymbolic-functions.
     - Use a different priority for libssl0.9.8/restart-services
       depending on whether a desktop, or server dist-upgrade is being
       performed.
     - Display a system restart required notification bubble on libssl0.9.8
       upgrade.
     - Don't build for processors no longer supported: i486, i586
       (on i386), v8 (on sparc).
     - Create libssl0.9.8-udeb, for the benefit of wget-udeb (no
       wget-udeb package in Debian).
     - Replace duplicate files in the doc directory with symlinks.
     - Move runtime libraries to /lib, for the benefit of wpasupplicant.
     - Ship documentation in openssl-doc, suggested by the package.
       (Closes: #470594)
     - Use host compiler when cross-building. Patch from Neil Williams.
       (Closes: #465248).
     - Don't run 'make test' when cross-building.
     - debian/patches/aesni.patch: Backport Intel AES-NI support from
       http://rt.openssl.org/Ticket/Display.html?id=2067 (refreshed)
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths
       under .pc.
     - debian/patches/no-sslv2.patch: disable SSLv2 to match NSS
       and GnuTLS. The protocol is unsafe and extremely deprecated.
       (Closes: #589706)

openssl (0.9.8o-4) unstable; urgency=low

   * Fix CVE-2010-4180 (Closes: #529221)

openssl (0.9.8o-3ubuntu1) natty; urgency=low

   * Merge from debian unstable (LP: #677756).  Remaining changes:
     - debian/patches/Bsymbolic-functions.patch: Link using
       -Bsymbolic-functions (refreshed)
     - Use a different priority for libssl0.9.8/restart-services
       depending on whether a desktop, or server dist-upgrade is being
       performed.
     - Display a system restart required notification bubble on libssl0.9.8
       upgrade.
     - Don't build for processors no longer supported: i486, i586
       (on i386), v8 (on sparc).
     - Create libssl0.9.8-udeb, for the benefit of wget-udeb (no
       wget-udeb package in Debian)
     - Replace duplicate files in the doc directory with symlinks.
     - Move runtime libraries to /lib, for the benefit of wpasupplicant
     - Ship documentation in openssl-doc, suggested by the package.
       (Debian bug 470594)
     - Use host compiler when cross-building (patch from Neil Williams in
       Debian bug 465248).
     - Don't run 'make test' when cross-building.
     - debian/patches/aesni.patch: Backport Intel AES-NI support from
       http://rt.openssl.org/Ticket/Display.html?id=2067 (refreshed)
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths
       under .pc.
     - debian/patches/no-sslv2.patch: disable SSLv2 to match NSS
       and GnuTLS. The protocol is unsafe and extremely deprecated.
       (Debian bug 589706)
   * Dropped patches, now upstream:
     - debian/patches/CVE-2010-2939.patch (Debian patch is identically
       named)

openssl (0.9.8o-3) unstable; urgency=high

   * Fix TLS extension parsing race condition (CVE-2010-3864) (Closes: #603709)
   * Re-add the engines.  They were missing since 0.9.8m-1.
     Patch by Joerg Schneider. (Closes: #603693)
   * Not all architectures were build using -g (Closes: #570702)
   * Add powerpcspe support (Closes: #579805)
   * Add armhf support (Closes: #596881)
   * Update translations:
     - Brazilian Portuguese (Closes: #592154)
     - Danish (Closes: #599459)
     - Vietnamese (Closes: #601536)
     - Arabic (Closes: #596166)
   * Generate the proper stamp file so that everything doesn't get build twice.

openssl (0.9.8o-2) unstable; urgency=high

   * Fix CVE-2010-2939: Double free using ECDH. (Closes: #594415)

openssl (0.9.8o-1ubuntu4.1) maverick-security; urgency=low

   * SECURITY UPDATE: denial of service and possible code execution via
     crafted private key with an invalid prime.
     - debian/patches/CVE-2010-2939.patch: set bn_ctx to NULL after freeing
       it in ssl/s3_clnt.c.
     - CVE-2010-2939

openssl (0.9.8o-1ubuntu4) maverick; urgency=low

   * Update AES-NI patch to openssl-0.9.8-aesni-modes-perlasm-win32-v4.patch
     from http://rt.openssl.org/Ticket/Display.html?id=2067, fixing segfault
     on engine initialisation (LP: #590639).

openssl (0.9.8o-1ubuntu3) maverick; urgency=low

   * debian/patches/no-sslv2.patch: disable SSLv2 to match NSS and GnuTLS.
     The protocol is unsafe and extremely deprecated. (Debian bug 589706)

openssl (0.9.8o-1ubuntu2) maverick; urgency=low

   * Don't build anymore for processors not supported anymore in maverick:
     - i486, i586 (on i386).
     - v8 (on sparc).

openssl (0.9.8o-1ubuntu1) maverick; urgency=low

   * Merge from debian unstable, remaining changes (LP: #581167):
     - debian/patches/Bsymbolic-functions.patch: Link using
       -Bsymbolic-functions
     - Ship documentation in openssl-doc, suggested by the package.
     - Use a different priority for libssl0.9.8/restart-services
       depending on whether a desktop, or server dist-upgrade is being
       performed.
     - Display a system restart required notification bubble on libssl0.9.8
       upgrade.
     - Replace duplicate files in the doc directory with symlinks.
     - Move runtime libraries to /lib, for the benefit of wpasupplicant
     - Use host compiler when cross-building (patch from Neil Williams in
       Debian #465248).
     - Don't run 'make test' when cross-building.
     - Create libssl0.9.8-udeb, for the benefit of wget-udeb (LP: #503339).
     - debian/patches/aesni.patch: Backport Intel AES-NI support from
       http://rt.openssl.org/Ticket/Display.html?id=2067 (LP: #485518).
     - debian/patches/perlpath-quilt.patch: Don't change perl #! paths
       under .pc.
   * Dropped patches, now upstream:
     - debian/patches/CVE-2009-3245.patch
     - debian/patches/CVE-2010-0740.patch
     - debian/patches/dtls-compatibility.patch
     - debian/patches/CVE-2009-4355.patch
   * Dropped "Add support for lpia".
   * Dropped "Disable SSLv2 during compile" as this had never actually
     disabled SSLv2.
   * Don't disable CVE-2009-3555.patch for Maverick.

openssl (0.9.8o-1) unstable; urgency=low

   * New upstream version
     - Add SHA2 algorithms to SSL_library_init().
     - aes-x86_64.pl is now PIC, update pic.patch.
   * Add sparc64 support (Closes: #560240)

openssl (0.9.8n-1) unstable; urgency=high

   * New upstream version.
     - Fixes CVE-2010-0740.
     - Drop cfb.patch, applied upstream.

openssl (0.9.8m-2) unstable; urgency=low

   * Revert CFB block length change preventing reading older files.
     (Closes: #571810, #571940)

openssl (0.9.8m-1) unstable; urgency=low

   * New upstream version
     - Implements RFC5746, reenables renegotiation but requires the extension.
     - Fixes CVE-2009-3245
     - Drop patches CVE-2009-4355.patch, CVE-2009-1378.patch,
       CVE-2009-1377.patch, CVE-2009-1379.patch, CVE-2009-3555.patch,
       CVE-2009-2409.patch, CVE-2009-1387.patch, tls_ext_v3.patch,
       no_check_self_signed.patch: applied upstream
     - pk7_mime_free.patch removed, code rewritten
     - ca.diff partially applied upstream
     - engines-path.patch adjusted, upstream made some minor changes to the
       build system.
     - some flags changed values, bump shlibs.
   * Switch to 3.0 (quilt) source package.
   * Make sure the package is properly cleaned.
   * Add ${misc:Depends} to the Depends on all packages.
   * Fix spelling of extension in the changelog file.

openssl (0.9.8k-8) unstable; urgency=high

   * Clean up zlib state so that it will be reinitialized on next use and
     not cause a memory leak.  (CVE-2009-4355, CVE-2008-1678)

openssl (0.9.8k-7ubuntu8) lucid; urgency=low

   * SECURITY UPDATE: denial of service and possible arbitrary code
     execution via unchecked return values
     - debian/patches/CVE-2009-3245.patch: check bn_wexpand return value in
       crypto/bn/{bn_div.c,bn_gf2m.c,bn_mul.c}, crypto/ec/ec2_smpl.c,
       engines/e_ubsec.c.
     - CVE-2009-3245
   * SECURITY UPDATE: denial of service via "record of death"
     - debian/patches/CVE-2010-0740.patch: only send back minor version
       number in ssl/s3_pkt.c.
     - CVE-2010-0740

openssl (0.9.8k-7ubuntu7) lucid; urgency=low

   * debian/patches/dtls-compatibility.patch: backport dtls compatibility
     code from 0.9.8m to fix interopability. (LP: #516318)

openssl (0.9.8k-7ubuntu6) lucid; urgency=low

   * Backport Intel AES-NI support from
     http://rt.openssl.org/Ticket/Display.html?id=2067 (LP: #485518).
   * Don't change perl #! paths under .pc.

openssl (0.9.8k-7ubuntu5) lucid; urgency=low

   * SECURITY UPDATE: memory leak possible during state clean-up.
     - Add CVE-2009-4355.patch, upstream fixes thanks to Debian.

openssl (0.9.8k-7ubuntu4) lucid; urgency=low

   * Use host compiler when cross-building (patch from Neil Williams in
     Debian #465248).
   * Don't run 'make test' when cross-building.
   * Create libssl0.9.8-udeb, for the benefit of wget-udeb (LP: #503339).

2009

openssl (0.9.8k-7ubuntu3) lucid; urgency=low

   * debian/patches/disable-sslv2.patch: remove and apply inline to fix
     FTBFS when patch won't revert during the build process.

openssl (0.9.8k-7ubuntu2) lucid; urgency=low

   * debian/patches/{disable-sslv2,Bsymbolic-functions}.patch: apply
     Makefile sections inline as once the package is configured during the
     build process, the patches wouldn't revert anymore, causing a FTBFS on
     anything other than amd64.

openssl (0.9.8k-7ubuntu1) lucid; urgency=low

   * Merge from debian unstable, remaining changes (LP: #493392):
     - Link using -Bsymbolic-functions
     - Add support for lpia
     - Disable SSLv2 during compile
     - Ship documentation in openssl-doc, suggested by the package.
     - Use a different priority for libssl0.9.8/restart-services
       depending on whether a desktop, or server dist-upgrade is being
       performed.
     - Display a system restart required notification bubble on libssl0.9.8
       upgrade.
     - Replace duplicate files in the doc directory with symlinks.
     - Move runtime libraries to /lib, for the benefit of wpasupplicant
   * Strip the patches out of the source into quilt patches
   * Disable CVE-2009-3555.patch

openssl (0.9.8k-7) unstable; urgency=low

   * Bump the shlibs to require 0.9.8k-1.  The following symbols
     to added between g and k: AES_wrap_key, AES_unwrap_key,
     ASN1_TYPE_set1, ASN1_STRING_set0, asn1_output_data_fn,
     SMIME_read_ASN1, BN_X931_generate_Xpq, BN_X931_derive_prime_ex,
     BN_X931_generate_prime_ex, COMP_zlib_cleanup, CRYPTO_malloc_debug_init,
     int_CRYPTO_set_do_dynlock_callback, CRYPTO_set_mem_info_functions,
     CRYPTO_strdup, CRYPTO_dbg_push_info, CRYPTO_dbg_pop_info,
     CRYPTO_dbg_remove_all_info, OPENSSL_isservice, OPENSSL_init,
     ENGINE_set_load_ssl_client_cert_function,
     ENGINE_get_ssl_client_cert_function, ENGINE_load_ssl_client_cert,
     EVP_CIPHER_CTX_set_flags, EVP_CIPHER_CTX_clear_flags,
     EVP_CIPHER_CTX_test_flags, HMAC_CTX_set_flags, OCSP_sendreq_new
     OCSP_sendreq_nbio, OCSP_REQ_CTX_free, RSA_X931_derive_ex,
     RSA_X931_generate_key_ex, X509_ALGOR_set0, X509_ALGOR_get0,
     X509at_get0_data_by_OBJ, X509_get1_ocsp

openssl (0.9.8k-6) unstable; urgency=low

   * Disable SSL/TLS renegotiation (CVE-2009-3555) (Closes: #555829)

openssl (0.9.8k-5) unstable; urgency=low

   * Don't check self signed certificate signatures in X509_verify_cert()
     (Closes: #541735)

openssl (0.9.8k-4) unstable; urgency=low

   * Split all the patches into a separate files
   * Stop undefinging HZ, the issue on alpha should be fixed.
   * Remove MD2 from digest algorithm table.  (CVE-2009-2409) (Closes: #539899)

openssl (0.9.8k-3) unstable; urgency=low

   * Make rc4-x86_64 PIC.  Based on patch from Petr Salinger (Closes: #532336)
   * Add workaround for kfreebsd that can't see the different between
     two pipes.  Patch from Petr Salinger.

openssl (0.9.8k-2) unstable; urgency=low

   * Move libssl0.9.8-dbg to the debug section.
   * Use the rc4 assembler on kfreebsd-amd64 (Closes: #532336)
   * Split the line to generate md5-x86_64.s in the Makefile.  This will
     hopefully fix the build issue on kfreebsd that now outputs the file
     to stdout instead of the file.
   * Fix denial of service via an out-of-sequence DTLS handshake message
     (CVE-2009-1387) (Closes: #532037)

openssl (0.9.8k-1) unstable; urgency=low

   * New upstream release
     - 0.9.8i fixed denial of service via a DTLS ChangeCipherSpec packet
       that occurs before ClientHello (CVE-2009-1386)
   * Make aes-x86_64.pl use PIC.
   * Fix security issues (Closes: #530400)
     - "DTLS record buffer limitation bug." (CVE-2009-1377)
     - "DTLS fragment handling" (CVE-2009-1378)
     - "DTLS use after free" (CVE-2009-1379)
   * Fixed Configure for hurd: use -mtune=i486 instead of -m486
     Patch by Marc Dequènes (Duck) <duck@hurdfr.org> (Closes: #530459)
   * Add support for avr32 (Closes: #528648)

openssl (0.9.8g-16ubuntu3) karmic; urgency=low

   * SECURITY UPDATE: certificate spoofing via hash collisions from MD2
     design flaws.
     - crypto/evp/c_alld.c, ssl/ssl_algs.c: disable MD2 digest.
     - crypto/x509/x509_vfy.c: skip signature check for self signed
       certificates
     - http://marc.info/?l=openssl-cvs&m=124508133203041&w=2
     - http://marc.info/?l=openssl-cvs&m=124704528713852&w=2
     - CVE-2009-2409

openssl (0.9.8g-16ubuntu2) karmic; urgency=low

   * Patches forward ported from http://www.ubuntu.com/usn/USN-792-1 (by
     Marc Deslauriers)
   * SECURITY UPDATE: denial of service via memory consumption from large
     number of future epoch DTLS records.
     - crypto/pqueue.*: add new pqueue_size counter function.
     - ssl/d1_pkt.c: use pqueue_size to limit size of queue to 100.
     - http://cvs.openssl.org/chngview?cn=18187
     - CVE-2009-1377
   * SECURITY UPDATE: denial of service via memory consumption from
     duplicate or invalid sequence numbers in DTLS records.
     - ssl/d1_both.c: discard message if it's a duplicate or too far in the
       future.
     - http://marc.info/?l=openssl-dev&m=124263491424212&w=2
     - CVE-2009-1378
   * SECURITY UPDATE: denial of service or other impact via use-after-free
     in dtls1_retrieve_buffered_fragment.
     - ssl/d1_both.c: use temp frag_len instead of freed frag.
     - http://rt.openssl.org/Ticket/Display.html?id=1923&user=guest&pass=guest
     - CVE-2009-1379
   * SECURITY UPDATE: denial of service via DTLS ChangeCipherSpec packet
     that occurs before ClientHello.
     - ssl/s3_pkt.c: abort if s->session is NULL.
     - ssl/{ssl.h,ssl_err.c}: add new error codes.
     - http://cvs.openssl.org/chngview?cn=17369
     - CVE-2009-1386
   * SECURITY UPDATE: denial of service via an out-of-sequence DTLS
     handshake message.
     - ssl/d1_both.c: don't buffer fragments with no data.
     - http://cvs.openssl.org/chngview?cn=17958
     - CVE-2009-1387

openssl (0.9.8g-16ubuntu1) karmic; urgency=low

   * Merge from debian unstable, remaining changes:
     - Link using -Bsymbolic-functions
     - Add support for lpia
     - Disable SSLv2 during compile
     - Ship documentation in openssl-doc, suggested by the package.
     - Use a different priority for libssl0.9.8/restart-services
       depending on whether a desktop, or server dist-upgrade is being
       performed.
     - Display a system restart required notification bubble on libssl0.9.8
       upgrade.
     - Replace duplicate files in the doc directory with symlinks.

openssl (0.9.8g-16) unstable; urgency=high

   * Properly validate the length of an encoded BMPString and UniversalString
     (CVE-2009-0590)  (Closes: #522002)

openssl (0.9.8g-15ubuntu3) jaunty; urgency=low

   * SECURITY UPDATE: crash via invalid memory access when printing BMPString
     or UniversalString with invalid length
     - crypto/asn1/tasn_dec.c, crypto/asn1/asn1_err.c and crypto/asn1/asn1.h:
       return error if invalid length
     - CVE-2009-0590
     - http://www.openssl.org/news/secadv_20090325.txt
     - patch from upstream CVS:
       crypto/asn1/asn1.h:1.128.2.11->1.128.2.12
       crypto/asn1/asn1_err.c:1.54.2.4->1.54.2.5
       crypto/asn1/tasn_dec.c:1.26.2.10->1.26.2.11

openssl (0.9.8g-15ubuntu2) jaunty; urgency=low

   * Move runtime libraries to /lib, for the benefit of wpasupplicant
     (LP: #44194). Leave symlinks behind in /usr/lib (except on the Hurd)
     since we used to set an rpath there.

openssl (0.9.8g-15ubuntu1) jaunty; urgency=low

   * Merge from debian unstable, remaining changes: LP: #314984
     - Link using -Bsymbolic-functions
     - Add support for lpia
     - Disable SSLv2 during compile
     - Ship documentation in openssl-doc, suggested by the package.
     - Use a different priority for libssl0.9.8/restart-services
       depending on whether a desktop, or server dist-upgrade is being
       performed.
     - Display a system restart required notification bubble on libssl0.9.8
       upgrade.
     - Replace duplicate files in the doc directory with symlinks.

openssl (0.9.8g-15) unstable; urgency=low

   * Internal calls to didn't properly check for errors which
     resulted in malformed DSA and ECDSA signatures being treated as
     a good signature rather than as an error.  (CVE-2008-5077)
   * ipv6_from_asc() could write 1 byte longer than the buffer in case
     the ipv6 address didn't have "::" part.  (Closes: #506111)

openssl (0.9.8g-14ubuntu2) jaunty; urgency=low

   * SECURITY UPDATE: clients treat malformed signatures as good when verifying
     server DSA and ECDSA certificates
     - update apps/speed.c, apps/spkac.c, apps/verify.c, apps/x509.c,
       ssl/s2_clnt.c, ssl/s2_srvr.c, ssl/s3_clnt.c, s3_srvr.c, and
       ssl/ssltest.c to properly check the return code of EVP_VerifyFinal()
     - patch based on upstream patch for #2008-016
     - CVE-2008-5077

2008

openssl (0.9.8g-14ubuntu1) jaunty; urgency=low

   * Merge from debian unstable, remaining changes:
     - Link using -Bsymbolic-functions
     - Add support for lpia
     - Disable SSLv2 during compile
     - Ship documentation in openssl-doc, suggested by the package.
     - Use a different priority for libssl0.9.8/restart-services
       depending on whether a desktop, or server dist-upgrade is being
       performed.
     - Display a system restart required notification bubble on libssl0.9.8
       upgrade.
     - Replace duplicate files in the doc directory with symlinks.

openssl (0.9.8g-14) unstable; urgency=low

   * Don't give the warning about security updates when upgrading
     from etch since it doesn't have any known security problems.
   * Automaticly use engines that succesfully initialised.  Patch
     from the 0.9.8h upstream version.  (Closes: #502177)

openssl (0.9.8g-13) unstable; urgency=low

   * Fix a problem with tlsext preventing firefox 3 from connection.
     Patch from upstream CVS and part of 0.9.8h.
     (Closes: #492758)

openssl (0.9.8g-12) unstable; urgency=low

   * add the changelog of the 10.1 NMU to make bugtracking happy

openssl (0.9.8g-11) unstable; urgency=low

   [ Christoph Martin ]
   * updated cs, gl, sv, ru, ro debconf translation (closes: #480926, #480967,
     #482465, #484324, #488595)
   * add Vcs-Svn header (closes: #481654)
   * fix debian-kfreebsd-i386 build flags (closes: #482275)
   * add stunnel4 to restart list (closes: #482111)
   * include fixes from 10.1 NMU by Security team
     - Fix double free in TLS server name extension which leads to a remote
       denial of service (CVE-2008-0891; Closes: #483379).
     - Fix denial of service if the 'Server Key exchange message'
       is omitted from a TLS handshake which could lead to a client
       crash (CVE-2008-1672; Closes: #483379).
       This only works if openssl is compiled with enable-tlsext which is
       done in Debian.
   * fix some lintian warnings
   * update to newest standards version

openssl (0.9.8g-10.1ubuntu2) intrepid; urgency=low

   * debian/rules:
     - disable SSLv2 during compile
   * debian/README.debian
     - add note about disabled SSLv2 in Ubuntu

openssl (0.9.8g-10.1ubuntu1) intrepid; urgency=low

   * Merge from debian unstable, remaining changes:
     - use a different priority for libssl0.9.8/restart-services depending on whether
       a desktop, or server dist-upgrade is being performed.
     - display a system restart required notification bubble on libssl0.9.8 upgrade.
     - ship documentation in new openssl-doc package.
     - configure: add support for lpia.
     - replace duplicate files in the doc directory with symlinks.
     - link using -bsymbolic-functions.
     - update maintainer as per spec.

openssl (0.9.8g-10.1) unstable; urgency=high

   * Non-maintainer upload by the Security team.
   * Fix denial of service if the 'Server Key exchange message'
     is omitted from a TLS handshake which could lead to a client
     crash (CVE-2008-1672; Closes: #483379).
     This only works if openssl is compiled with enable-tlsext which is
     done in Debian.
   * Fix double free in TLS server name extension which leads to a remote
     denial of service (CVE-2008-0891; Closes: #483379).

openssl (0.9.8g-10ubuntu1) intrepid; urgency=low

   * Merge from debian unstable, remaining changes:
     - Use a different priority for libssl0.9.8/restart-services depending on whether
       a desktop, or server dist-upgrade is being performed.
     - Display a system restart required notification bubble on libssl0.9.8 upgrade.
     - Ship documentation in new openssl-doc package.
     - Configure: Add support for lpia.
     - Replace duplicate files in the doc directory with symlinks.
     - Link using -Bsymbolic-functions.
     - Update maintainer as per spec.

openssl (0.9.8g-10) unstable; urgency=low

   * undefine HZ so that the code falls back to sysconf(_SC_CLK_TCK)
     to fix a build failure on alpha.

openssl (0.9.8g-9) unstable; urgency=high

   [ Christoph Martin ]
   * Include updated debconf translations (closes: #473477, #461597,
     #461880, #462011, #465517, #475439)
 
   [ Kurt Roeckx ]
   * ssleay_rand_add() really needs to call MD_Update() for buf.

openssl (0.9.8g-8ubuntu1) intrepid; urgency=low

   * Merge from debian unstable, remaining changes:
     - Use a different priority for libssl0.9.8/restart-services depending on whether
       a desktop, or server dist-upgrade is being performed.
     - Display a system restart required notification bubble on libssl0.9.8 upgrade.
     - Ship documentation in new openssl-doc package.
     - Configure: Add support for lpia.
     - Replace duplicate files in the doc directory with symlinks.
     - Link using -Bsymbolic-functions.
     - Update maintainer as per spec.

openssl (0.9.8g-8) unstable; urgency=high

   * Don't add extensions to ssl v3 connections.  It breaks with some
     other software.  (Closes: #471681)

openssl (0.9.8g-7) unstable; urgency=low

   * Upload to unstable.

openssl (0.9.8g-6) experimental; urgency=low

   * Bump shlibs.

openssl (0.9.8g-5) experimental; urgency=low

   * Enable tlsext.  This changes the ABI, but should hopefully
     not cause any problems. (Closes: #462596)

openssl (0.9.8g-4ubuntu3) hardy; urgency=low

   * Use a different priority for libssl0.9.8/restart-services depending on whether
     a desktop, or server dist-upgrade is being performed. (LP: #91814)
   * Display a system restart required notification bubble on libssl0.9.8 upgrade.

openssl (0.9.8g-4ubuntu2) hardy; urgency=low

   * Ship documentation in new openssl-doc package, since it is very large and
     not terribly useful for the casual desktop user.

openssl (0.9.8g-4ubuntu1) hardy; urgency=low

   * Merge from unstable; remaining changes:
     - Configure: Add support for lpia.
     - Replace duplicate files in the doc directory with symlinks.
     - Link using -Bsymbolic-functions.

openssl (0.9.8g-4) unstable; urgency=low

   * Fix aes ige test speed not to overwrite it's buffer and
     cause segfauls.  Thanks to Tim Hudson (Closes: #459619)
   * Mark some strings in the templates as non translatable.
     Patch from Christian Perrier <bubulle@debian.org> (Closes: #450418)
   * Update Dutch debconf translation (Closes: #451290)
   * Update French debconf translation (Closes: #451375)
   * Update Catalan debconf translation (Closes: #452694)
   * Update Basque debconf translation (Closes: #457285)
   * Update Finnish debconf translation (Closes: #458261)

2007

openssl (0.9.8g-3ubuntu1) hardy; urgency=low

   * Merge with Debian; remaining changes:
     - Configure: Add support for lpia.
     - Replace duplicate files in the doc directory with symlinks.

openssl (0.9.8g-3) unstable; urgency=low

   * aes-586.pl: push %ebx on the stack before we put some things on the
     stack and call a function, giving AES_decrypt() wrong values to work
     with.  (Closes: #449200)

openssl (0.9.8g-2) unstable; urgency=low

   * Avoid text relocations on i386 caused by the assembler versions:
     - x86unix.pl: Create a function_begin_B_static to create a
       static/local assembler function.
     - aes-586.pl: Use the function_begin_B_static for _x86_AES_decrypt
       so that it doesn't get exported and doesn't have any (text) relocations.
     - aes-586.pl: Set up ebx to point to the GOT and call AES_set_encrypt_key
       via the PLT to avoid a relocation.
     - x86unix.pl: Call the init function via the PLT, avoiding a relocation
       in case of a PIC object.
     - cbc.pl: Call functions via the PLT.
     - desboth.pl: Call DES_encrypt2 via the PLT.
   * CA.sh should use the v3_ca extension when called with -newca
     (Closes: #428051)
   * Use -Wa,--noexecstack for all arches in Debian.  (Closes: #430583)
   * Convert the failure message when services fail restart to a debconf
     message.
   * To restart a service, just restart, instead of stop and start.
     Hopefully fixes #444946
   * Also remove igetest from the test dir in the clean target.
     (Closes: #424362)

openssl (0.9.8g-1) unstable; urgency=low

   * New upstream release
     - Fixes version number not to say it's a development version.

openssl (0.9.8f-1) unstable; urgency=low

   * New upstream release
     - Fixes DTLS issues, also fixes CVE-2007-4995 (Closes: #335703, #439737)
     - Proper inclusion of opensslconf.h in pq_compat.h (Closes: #408686)
     - New function SSL_set_SSL_CTX: bump shlibs.
   * Remove build dependency on gcc > 4.2
   * Remove the openssl preinst, it looks like a workaround
     for a change in 0.9.2b where config files got moved.  (Closes: #445095)
   * Update debconf translations:
     - Vietnamese (Closes: #426988)
     - Danish (Closes: #426774)
     - Slovak (Closes: #440723)
     - Finnish (Closes: #444258)

openssl (0.9.8e-9) unstable; urgency=high

   * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers().
     (Closes: #444435)
   * Add postgresql-8.2 to the list of services to check.

openssl (0.9.8e-8) unstable; urgency=low

   * Fix another case of the "if this code is reached, the program will abort"
     (Closes: #429740)
   * Temporary force to build with gcc >= 4.2

openssl (0.9.8e-7) unstable; urgency=low

   * Fix problems with gcc-4.2 (Closes: #429740)
   * Stop using -Bsymbolic to create the shared library.
   * Make x86_64cpuid.pl use PIC.

openssl (0.9.8e-6) unstable; urgency=high

   * Add fix for CVE-2007-3108 (Closes: #438142)

openssl (0.9.8e-5ubuntu3) gutsy; urgency=low

   * Replace duplicate files in the doc directory with symlinks.

openssl (0.9.8e-5ubuntu2) gutsy; urgency=low

   [ Jamie Strandboge ]
   * SECURITY UPDATE: off-by-one error in SSL_get_shared_ciphers() results in
     buffer overflow
   * ssl/ssl_lib.c: applied upstream patch from openssl CVS thanks to
     Stephan Hermann
   * References:
     CVE-2007-5135
     http://www.securityfocus.com/archive/1/archive/1/480855/100/0/threaded
     Fixes LP: #146269
   * Modify Maintainer value to match the DebianMaintainerField
     specification.
 
   [ Kees Cook ]
   * SECURITY UPDATE: side-channel attacks via BN_from_montgomery function.
   * crypto/bn/bn_mont.c: upstream patch from openssl CVS thanks to Debian.
   * References
     CVE-2007-3108

openssl (0.9.8e-5ubuntu1) gutsy; urgency=low

   * Configure: Add support for lpia.
   * Explicitely build using gcc-4.1 (PR other/31359).

openssl (0.9.8e-5) unstable; urgency=low

   [ Christian Perrier ]
   * Debconf templates proofread and slightly rewritten by
     the debian-l10n-english team as part of the Smith Review Project.
     Closes: #418584
   * Debconf templates translations:
     - Arabic. Closes: #418669
     - Russian. Closes: #418670
     - Galician. Closes: #418671
     - Swedish. Closes: #418679
     - Korean. Closes: #418755
     - Czech. Closes: #418768
     - Basque. Closes: #418784
     - German. Closes: #418785
     - Traditional Chinese. Closes: #419915
     - Brazilian Portuguese. Closes: #419959
     - French. Closes: #420429
     - Italian. Closes: #420461
     - Japanese. Closes: #420482
     - Catalan. Closes: #420833
     - Dutch. Closes: #420925
     - Malayalam. Closes: #420986
     - Portuguese. Closes: #421032
     - Romanian. Closes: #421708
 
   [ Kurt Roeckx ]
   * Remove the Provides for the udeb. Patch from Frans Pop. (Closes: #419608)
   * Updated Spanish debconf template.  (Closes: #421336)
   * Do the header changes, changing those defines into real functions,
     and bump the shlibs to match.
   * Update Japanese debconf translation.  (Closes: #422270)

openssl (0.9.8e-4) unstable; urgency=low

   * openssl should depend on libssl0.9.8 0.9.8e-1 since it
     uses some of the defines that changed to functions.
     Other things build against libssl or libcrypto shouldn't
     have this problem since they use the old headers.
     (Closes: #414283)

openssl (0.9.8e-3) unstable; urgency=low

   * Add nagios-nrpe-server to the list of services to be checked
     (Closes: #391188)
   * EVP_CIPHER_CTX_key_length() should return the set key length in the
     EVP_CIPHER_CTX structure which may not be the same as the underlying
     cipher key length for variable length ciphers.
     From upstream CVS.  (Closes: #412979)

openssl (0.9.8e-2) unstable; urgency=low

   * Undo include changes that change defines into real functions,
     but keep the new functions in the library.

openssl (0.9.8e-1) unstable; urgency=low

   * New upstream release
     - Inludes security fixes for CVE-2006-2937, CVE-2006-2940,
       CVE-2006-3738, CVE-2006-4343 (Closes: #408902)
     - s_client now properly works with SMTP.  Also added support
       for IMAP.  (closes: #221689)
     - Load padlock modules (Closes: #345656, #368476)
   * Add clamav-freshclam and clamav-daemon to the list of service that
     need to be restarted.  (Closes: #391191)
   * Add armel support.  Thanks to Guillem Jover <guillem.jover@nokia.com>
     for the patch.  (Closes: #407196)
   * Add Portuguese translations.  Thanks to Carlos Lisboa.  (Closes: 408157)
   * Add Norwegian translations.  Thanks to Bjørn Steensrud
     <bjornst@powertech.no> (Closes: #412326)

2006

openssl (0.9.8c-4) unstable; urgency=low

   * Add German debconf translation.  Thanks to
     Johannes Starosta <feedback-an-johannes@arcor.de> (Closes: #388108)
   * Make c_rehash look for both .pem and .crt files.  Also make it support
     files in DER format.  Patch by "Yauheni Kaliuta" <y.kaliuta@gmail.com>
     (Closes: #387089)
   * Use & instead of && to check a flag in the X509 policy checking.
     Patch from upstream cvs.  (Closes: #397151)
   * Also restart slapd for security updates (Closes: #400221)
   * Add Romanian debconf translation.  Thanks to
     stan ioan-eugen <stan.ieugen@gmail.com> (Closes: #393507)

openssl (0.9.8c-3) unstable; urgency=low

   * Fix patch for CVE-2006-2940, it left ctx unintiliased.

openssl (0.9.8c-2) unstable; urgency=high

   * Fix security vulnerabilities (CVE-2006-2937, CVE-2006-2940,
     CVE-2006-3738, CVE-2006-4343).  Urgency set to high.

openssl (0.9.8c-1) unstable; urgency=low

   * New upstream release
     - block padding bug with compression now fixed upstream, using
       their patch.
     - Includes the RSA Signature Forgery (CVE-2006-4339) patch.
     - New functions AES_bi_ige_encrypt and AES_ige_encrypt:
       bumping shlibs to require 0.9.8c-1.
   * Change the postinst script to check that ntp is installed instead
     of ntp-refclock and ntp-simple.  The binary is now in the ntp
     package.
   * Move the modified rand/md_rand.c file to the right place,
     really fixing #363516.
   * Add partimage-server conserver-server and tor to the list of service
     to check for restart.  Add workaround for openssh-server so it finds
     the init script.  (Closes: #386365, #386400, #386513)
   * Add manpage for c_rehash.
     Thanks to James Westby <jw+debian@jameswestby.net> (Closes: #215618)
   * Add Lithuanian debconf translation.
     Thanks to Gintautas Miliauskas <gintas@akl.lt>  (Closes: #374364)
   * Add m32r support.
     Thanks to Kazuhiro Inaoka <inaoka.kazuhiro@renesas.com>
     (Closes: #378689)

openssl (0.9.8b-3) unstable; urgency=high

   * Fix RSA Signature Forgery (CVE-2006-4339) using patch provided
     by upstream.
   * Restart services using a smaller version that 0.9.8b-3, so
     they get the fixed version.
   * Change the postinst to check for postfix instead of postfix-tls.

openssl (0.9.8b-2) unstable; urgency=low

   * Don't call gcc with -mcpu on i386, we already use -march, so no need for
     -mtune either.
   * Always make all directories when building something:
     - The engines directory didn't get build for the static directory, so
       where missing in libcrypo.a
     - The apps directory didn't always get build, so we didn't have an openssl
       and a small part of the regression tests failed.
   * Make the package fail to build if the regression tests fail.

openssl (0.9.8b-1) unstable; urgency=low

   * New upstream release
     - New functions added (EVP_CIPHER_CTX_new, EVP_CIPHER_CTX_free), bump shlibs.
     - CA.pl/CA.sh now calls openssl ca with -extensions v3_ca, setting CA:TRUE
       instead of FALSE.
     - CA.pl/CA.sh creates crlnumber now.  (Closes: #347612)
   * Run debconf-updatepo, which really already was in the 0.9.8a-8 version
     as it was uploaded.
   * Add Galician debconf translation.  Patch from
     Jacobo Tarrio <jtarrio@trasno.net>  (Closes: #361266)
   * libssl0.9.8.postinst makes uses of bashisms (local variables)
     so use #!/bin/bash
   * libssl0.9.8.postinst: Call set -e after sourcing the debconf
     script.
   * libssl0.9.8.postinst: Change list of service that may need
     to be restarted:
     - Replace ssh by openssh-server
     - Split postgresql in postgresql-7.4 postgresql-8.0 postgresql-8.1
     - Add: dovecot-common bind9 ntp-refclock ntp-simple openntpd clamcour
       fetchmail ftpd-ssl proftpd proftpd-ldap proftpd-mysql proftpd-pgsql
   * libssl0.9.8.postinst: The check to see if something was installed
     wasn't working.
   * libssl0.9.8.postinst: Add workaround to find the name of the init
     script for proftpd and dovecot.
   * libssl0.9.8.postinst: Use invoke-rc.d when it's available.
   * Change Standards-Version to 3.7.0:
     - Make use of invoke-rc.d
   * Add comment to README.Debian that rc5, mdc2 and idea have been
     disabled (since 0.9.6b-3)  (Closes: #362754)
   * Don't add uninitialised data to the random number generator.  This stop
     valgrind from giving error messages in unrelated code.
     (Closes: #363516)
   * Put the FAQ in the openssl docs.
   * Add russian debconf translations from Yuriy Talakan <yt@amur.elektra.ru>
     (Closes #367216)

openssl (0.9.8a-8) unstable; urgency=low

   * Call pod2man with the proper section.  Section changed
     from 1/3/5/7 to 1SSL/3SSL/5SSL/7SSL.  The name of the files
     already had the ssl in, the section didn't.  The references
     to other manpage is still wrong.
   * Don't install the LICENSE file, it's already in the copyright file.
   * Don't set an rpath on openssl to point to /usr/lib.
   * Add support for kfreebsd-amd64. (Closes: #355277)
   * Add udeb to the shlibs.  Patch from Frans Pop <aragorn@tiscali.nl>
     (Closes: #356908)

openssl (0.9.8a-7) unstable; urgency=high

   * Add italian debconf templates.  Thanks to Luca Monducci.
     (Closes: #350249)
   * Change the debconf question to use version 0.9.8-3
     instead of 0.9.8-1, since that's the last version
     with a security fix.
   * Call conn_state() if the BIO is not in the BIO_CONN_S_OK state
     (Closes: #352047).  RC bug affecting testing, so urgency high.

openssl (0.9.8a-6) unstable; urgency=low

   * Remove empty postinst/preinst/prerm scripts.  There is no need
     to have empty ones, debhelper will add them when needed.
   * Remove the static pic libraries.  Nobody should be linking
     it's shared libraries static to libssl or libcrypto.
     This was added for opensc who now links to it shared.
   * Do not assume that in case the sequence number is 0 and the
     packet has an odd number of bytes that the other side has
     the block padding bug, but try to check that it actually
     has the bug.  The wrong detection of this bug resulted
     in an "decryption failed or bad record mac" error in case
     both sides were using zlib compression.  (Closes: #338006)

2005

openssl (0.9.8a-5) unstable; urgency=low

   * Stop ssh from crashing randomly on sparc (Closes: #335912)
     Patch from upstream cvs.

openssl (0.9.8a-4) unstable; urgency=low

   * Call dh_makeshlibs with the proper version instead of putting
     it in shlibs.local, which doesn't seem to do anything.  0.9.8a-1
     added symbol versioning, so it should have bumped the shlibs.
     (Closes: #338284)
   * The openssl package had a duplicate dependency on libssl0.9.8,
     only require the version as required by the shlibs.
   * Make libssl-dev depend on zlib1g-dev, since it's now required for
     static linking. (Closes: #338313)
   * Generate .pc files that make use of Libs.private, so things only
     link to the libraries they should when linking shared.
   * Use -m64 instead of -bpowerpc64-linux on ppc64. (Closes: #335486)
   * Make powerpc and ppc64 use the assembler version for bn.  ppc64
     had the location in the string wrong, powerpc had it missing.
   * Add includes for stddef to get size_t in md2.h, md4.h, md5.h,
     ripemd.h and sha.h.  (Closes: #333101)
   * Run make test for each of the versions we build, make it
     not fail the build process if an error is found.
   * Add build dependency on bc for the regression tests.

openssl (0.9.8a-3) unstable; urgency=high

   * Link to libz instead of dynamicly loading it.  It gets loaded
     at the moment the library is initialised, so there is no point
     in not linking to it.  It's now failing in some cases since
     it's not opened by it's soname, but by the symlink to it.
     This should hopefully solve most of the bugs people have reported
     since the move to libssl0.9.8.
     (Closes: #334180, #336140, #335271)
   * Urgency set to high because it fixes a grave bug affecting testing.

openssl (0.9.8a-2) unstable; urgency=low

   * Add Build-Dependency on m4, since sparc needs it to generate
     it's assembler files.  (Closes: #334542)
   * Don't use rc4-x86_64.o on amd64 for now, it seems to be broken
     and causes a segfault.  (Closes: #334501, #334502)

openssl (0.9.8a-1) unstable; urgency=low

   Christoph Martin:
   * fix asm entries for some architectures, fixing #332758 properly.
   * add noexecstack option to i386 subarch
   * include symbol versioning in Configure (closes: #330867)
   * include debian-armeb arch (closes: #333579)
   * include new upstream patches; includes some minor fixes
   * fix dh_shlibdeps line, removing the redundant dependency on
     libssl0.9.8 (closes: #332755)
   * add swedish debconf template (closes: #330554)
 
   Kurt Roeckx:
   * Also add noexecstack option for amd64, since it now has an
     executable stack with the assembler fixes for amd64.

openssl (0.9.8-3) unstable; urgency=low

   * Apply security fix for CAN-2005-2969. (Closes: #333500)
   * Change priority of -dbg package to extra.

openssl (0.9.8-2) unstable; urgency=low

   * Don't use arch specific assembler.  Should fix build failure on
     ia64, sparc and amd64. (Closes: #332758)
   * Add myself to the uploaders.

openssl (0.9.8-1) unstable; urgency=low

   * New upstream release (closes: #311826)

openssl (0.9.7g-3) unstable; urgency=low

   * change Configure line for debian-freebsd-i386 to debian-kfreebsd-i386
     (closes: #327692)
   * include -dbg version. That implies compiling with -g and without
     -fomit-frame-pointer (closes: #293823, #153811)

openssl (0.9.7g-2) unstable; urgency=low

   * really include nl translation
   * remove special ia64 code from rc4 code to make the abi compatible to
     older 0.9.7 versions (closes: #310489, #309274)
   * fix compile flag for debian-ppc64 (closes: #318750)
   * small fix in libssl0.9.7.postinst (closes: #239956)
   * fix pk7_mime.c to prevent garbled messages because of to early memory
     free (closes: #310184)
   * include vietnamese debconf translation (closes: #316689)
   * make optimized i386 libraries have non executable stack (closes:
     #321721)
   * remove leftover files from ssleay
   * move from dh_installmanpages to dh_installman
   * change Maintainer to pkg-openssl-devel@lists.alioth.debian.org

openssl (0.9.7g-1) unstable; urgency=low

   * New upstream release
     * Added support for proxy certificates according to RFC 3820.
       Because they may be a security thread to unaware applications,
       they must be explicitely allowed in run-time.  See
       docs/HOWTO/proxy_certificates.txt for further information.
     * Prompt for pass phrases when appropriate for PKCS12 input format.
     * Back-port of selected performance improvements from development
       branch, as well as improved support for PowerPC platforms.
     * Add lots of checks for memory allocation failure, error codes to indicate
       failure and freeing up memory if a failure occurs.
     * Perform some character comparisons of different types in X509_NAME_cmp:
       this is needed for some certificates that reencode DNs into UTF8Strings
       (in violation of RFC3280) and can't or wont issue name rollover
       certificates.
   * corrected watchfile
   * added upstream source url (closes: #292904)
   * fix typo in CA.pl.1 (closes: #290271)
   * change debian-powerpc64 to debian-ppc64 and adapt the configure
     options to be the same like upstream (closes: #289841)
   * include -signcert option in CA.pl usage
   * compile with zlib-dynamic to use system zlib (closes: #289872)

2004

openssl (0.9.7e-3) unstable; urgency=high

   * really fix der_chop. The fix from -1 was not really included (closes:
     #281212)
   * still fixes security problem CAN-2004-0975 etc.
     - tempfile raise condition in der_chop
     - Avoid a race condition when CRLs are checked in a multi threaded
       environment.

openssl (0.9.7e-2) unstable; urgency=high

   * fix perl path in der_chop and c_rehash (closes: #281212)
   * still fixes security problem CAN-2004-0975 etc.
     - tempfile raise condition in der_chop
     - Avoid a race condition when CRLs are checked in a multi threaded
       environment.

openssl (0.9.7e-1) unstable; urgency=high

   * SECURITY UPDATE: fix insecure temporary file handling
   * apps/der_chop:
     - replaced $$-style creation of temporary files with
       File::Temp::tempfile()
     - removed unused temporary file name in do_certificate()
   * References:
     CAN-2004-0975 (closes: #278260)
   * fix ASN1_STRING_to_UTF8 with UTF8 (closes: #260357)
   * New upstream release with security fixes
     - Avoid a race condition when CRLs are checked in a multi threaded
       environment.
     - Various fixes to s3_pkt.c so alerts are sent properly.
     - Reduce the chances of duplicate issuer name and serial numbers (in
       violation of RFC3280) using the OpenSSL certificate creation
       utilities.
   * depends openssl on perl-base instead of perl (closes: #280225)
   * support powerpc64 in Configure (closes: #275224)
   * include cs translation (closes: #273517)
   * include nl translation (closes: #272479)
   * Fix default dir of c_rehash (closes: #253126)

openssl (0.9.7d-5) unstable; urgency=low

   * Make S/MIME encrypt work again (backport from CVS) (closes: #241407,
     #241386)

openssl (0.9.7d-4) unstable; urgency=low

   * add Catalan translation (closes: #248749)
   * add Spanish translation (closes: #254561)
   * include NMU fixes: see below
   * decrease optimisation level for debian-arm to work around gcc bug
     (closes: #253848) (thanks to Steve Langasek and Thom May)
   * Add libcrypto0.9.7-udeb. (closes: #250010) (thanks to Bastian Blank)
   * Add watchfile

openssl (0.9.7d-3) unstable; urgency=low

   * rename -pic.a libraries to _pic.a (closes: #250016)

openssl (0.9.7d-2) unstable; urgency=low

   * include PIC libs (libcrypto-pic.a and libssl-pic.a) to libssl-dev
     (closes: #246928, #243999)
   * add racoon to restart list (closes: #242652)
   * add Brazilian, Japanese and Danish translations (closes: #242087,
     #241830, #241705)

openssl (0.9.7d-1) unstable; urgency=high

   * new upstream
   * fixes security holes (http://www.openssl.org/news/secadv_20040317.txt)
     (closes: #238661)
   * includes support for debian-amd64 (closes: #235551, #232310)
   * fix typo in pem.pod (closes: #219873)
   * fix typo in libssl0.9.7.templates (closes: #224690)
   * openssl suggests ca-certificates (closes: #217180)
   * change debconf template to gettext format (closes: #219013)
   * include french debconf template (closes: #219014)

2003

openssl (0.9.7c-5) unstable; urgency=low

   * include openssl.pc into libssl-dev (closes: #212545)

openssl (0.9.7c-4) unstable; urgency=low

   * change question to restart services to debconf (closes: #214840)
   * stop using dh_undocumented (closes: #214831)

openssl (0.9.7c-3) unstable; urgency=low

   * fix POSIX conformance for head in libssl0.9.7.postinst (closes:
     #214700)

openssl (0.9.7c-2) unstable; urgency=low

   * add filerc macro to libssl0.9.7.postinst (closes: #213906)
   * restart spamassassins spamd on upgrade (closes: #214106)
   * restart more services on upgrade
   * fix EVP_BytesToKey manpage (closes: #213715)

openssl (0.9.7c-1) unstable; urgency=high

   * upstream security fix (closes: #213451)
    - Fix various bugs revealed by running the NISCC test suite:
      Stop out of bounds reads in the ASN1 code when presented with
      invalid tags (CAN-2003-0543 and CAN-2003-0544).
      Free up ASN1_TYPE correctly if ANY type is invalid (CAN-2003-0545).
      If verify callback ignores invalid public key errors don't try to check
      certificate signature with the NULL public key.
    - In ssl3_accept() (ssl/s3_srvr.c) only accept a client certificate
      if the server requested one: as stated in TLS 1.0 and SSL 3.0
      specifications.
   * more minor upstream bugfixes
   * fix formatting in c_issuer (closes: #190026)
   * fix Debian-FreeBSD support (closes: #200381)
   * restart some services in postinst to make them use the new libraries
   * remove duplicated openssl.1, crypto.3 and ssl.3 (closes: #198594)

openssl (0.9.7b-2) unstable; urgency=high

   * fix permission of /etc/ssl/private to 700 again
   * change section of libssl-dev to libdevel

openssl (0.9.7b-1) unstable; urgency=high

   * upstream security fix
    - Countermeasure against the Klima-Pokorny-Rosa extension of
      Bleichbacher's attack on PKCS #1 v1.5 padding: treat
      a protocol version number mismatch like a decryption error
      in ssl3_get_client_key_exchange (ssl/s3_srvr.c). (CAN-2003-0131)
     (closes: #189087)
    - Turn on RSA blinding by default in the default implementation
      to avoid a timing attack. Applications that don't want it can call
      RSA_blinding_off() or use the new flag RSA_FLAG_NO_BLINDING.
      They would be ill-advised to do so in most cases. (CAN-2003-0147)
    - Change RSA blinding code so that it works when the PRNG is not
      seeded (in this case, the secret RSA exponent is abused as
      an unpredictable seed -- if it is not unpredictable, there
      is no point in blinding anyway).  Make RSA blinding thread-safe
      by remembering the creator's thread ID in rsa->blinding and
      having all other threads use local one-time blinding factors
      (this requires more computation than sharing rsa->blinding, but
      avoids excessive locking; and if an RSA object is not shared
      between threads, blinding will still be very fast).
     for more details see the CHANGES file

openssl (0.9.7a-1) unstable; urgency=high

   * upstream Security fix
     - In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked
       via timing by performing a MAC computation even if incorrrect
       block cipher padding has been found.  This is a countermeasure
       against active attacks where the attacker has to distinguish
       between bad padding and a MAC verification error. (CAN-2003-0078)
     for more details see the CHANGES file

openssl (0.9.7-4) unstable; urgency=low

   * use DH_COMPAT=3 to build
   * move i686 to i686/cmov to fix problems on Via C3. For that to work we
     have to depend on the newest libc6 on i386 (closes: #177891)
   * fix bug in ui_util.c (closes: #177615)
   * fix typo in md5.h (closes: #178112)

openssl (0.9.7-3) unstable; urgency=low

   * enable build of ultrasparc code on non ultrasparc machines (closes:
     #177024)

openssl (0.9.7-2) unstable; urgency=low

   * include changes between 0.9.6g-9 and -10
     * fix problem in build-process on i386 with libc6 version number

openssl (0.9.7-1) unstable; urgency=low

   * new upstream
     * includes engine support
     * a lot of bugfixes and enhancements, see the CHANGES file
     * include AES encryption
     * makes preview of certificate configurable (closes: #176059)
     * fix x509 manpage (closes: #168070)
     * fix declaration of ERR_load_PEM_string in pem.h (closes: #141360)

2002

openssl (0.9.6g-10) unstable; urgency=low

   * fix problem in build-process on i386 with libc6 version number
     (closes: #167096)

openssl (0.9.6g-9) unstable; urgency=low

   * fix typo in i386 libc6 depend (sigh) (closes: #163848)

openssl (0.9.6g-8) unstable; urgency=low

   * fix libc6 depends. Only needed for i386 (closes: #163701)
   * remove SHLIB section for bsds from Configure (closes: #163585)

openssl (0.9.6g-7) unstable; urgency=low

   * enable i686 optimisation and depend on fixed glibc (closes: #163500)
   * remove transition package ssleay
   * include optimisation vor sparcv8 (closes: #139996)
   * improve optimisation vor sparcv9

openssl (0.9.6g-6) unstable; urgency=low

   * temporarily disable i686 optimisation (See bug in glibc #161788)

openssl (0.9.6g-5) unstable; urgency=low

   * i486 can use i586 assembler
   * include set -xe in the for loops in the rules files to make it abort
     on error (closes: #161768)

openssl (0.9.6g-4) unstable; urgency=low

   * fix optimization for alpha and sparc
   * add optimization for i486

openssl (0.9.6g-3) unstable; urgency=low

   * add optimized libraries for i586, i686, ev4, ev5 and v9 (closes: #139783)

openssl (0.9.6g-2) unstable; urgency=low

   * fix manpage names (closes: #156717, #156718, #156719, #156721)

openssl (0.9.6g-1) unstable; urgency=low

   * new upstream version
   * Use proper error handling instead of 'assertions' in buffer
     overflow checks added in 0.9.6e.  This prevents DoS (the
     assertions could call abort()). (closes: #155985, #156495)
   * Fix ASN1 checks. Check for overflow by comparing with LONG_MAX
     and get fix the header length calculation.
   * include support for new sh* architectures (closes: #155117)

openssl (0.9.6e-1) unstable; urgency=high

   * fixes remote exploits (see DSA-136-1)

openssl (0.9.6d-1) unstable; urgency=low

   * new upstream (minor) version
   * includes Configure lines for debian-*bsd-* (closes: #130413)
   * fix wrong prototype for BN_pseudo_rand_range in BN_rand(3ssl) (closes:
     #144586)
   * fix typos in package description (closes: #141469)
   * fix typo in SSL_CTX_set_cert_store manpage (closes: #135297)

openssl (0.9.6c-2) unstable; urgency=low

   * moved from non-US to main

openssl (0.9.6c-1) unstable; urgency=low

   * new upstream version with a lot of bugfixes
   * remove directory /usr/include/openssl from openssl package (closes:
     bug #121226)
   * remove selfdepends from libssl0.9.6
   * link openssl binary shared again

2001

openssl (0.9.6b-4) unstable; urgency=low

   * build with -D_REENTRANT for threads support on all architectures
     (closes: #112329, #119239)

openssl (0.9.6b-3) unstable; urgency=low

   * disable idea, mdc2 and rc5 because they are not free (closes: #65368)
   * ready to be moved from nonus to main

openssl (0.9.6b-2) unstable; urgency=high

   * fix definition of crypt in des.h (closes: #107533)
   * fix descriptions (closes: #109503)

openssl (0.9.6b-1) unstable; urgency=medium

   * new upstream fixes some security issues (closes: #105835, #100146)
   * added support for s390 (closes: #105681)
   * added support for sh (closes: #100003)
   * change priority of libssl096 to standard as ssh depends on it (closes:
     #105440)
   * don't optimize for i486 to support i386. (closes: #104127, #82194)

openssl (0.9.6a-3) unstable; urgency=medium

   * add perl-base to builddeps
   * include static libraries in libssl-dev (closes: #93688)

openssl (0.9.6a-2) unstable; urgency=medium

   * change Architecture of ssleay from any to all (closes: #92913)
   * depend libssl-dev on the exact same version of libssl0.9.6 (closes:
     #88939)
   * remove lib{crypto,ssl}.a from openssl (closes: #93666)
   * rebuild with newer gcc to fix atexit problem (closes: #94036)

openssl (0.9.6a-1) unstable; urgency=medium

   * new upstream, fixes some security bugs (closes: #90584)
   * fix typo in s_server manpage (closes: #89756)

openssl (0.9.6-2) unstable; urgency=low

   * policy: reorganisation of package names: libssl096 -> libssl0.9.6,
     libssl096-dev -> libssl-dev (closes: #83426)
   * libssl0.9.6 drops replaces libssl09 (Closes: #83425)
   * install upstream CHANGES files (Closes: #83430)
   * added support for hppa and ia64 (Closes: #88790)
   * move man3 manpages to libssl-dev (Closes: #87546)
   * fix formating problem in rand_add(1) (Closes: #87547)
   * remove manpage duplicates (Closes: #87545, #74986)
   * make package descriptions clearer (Closes: #83518, #83444)
   * increase default emailAddress_max from 40 to 60 (Closes: #67238)
   * removed RSAREF warning (Closes: #84122)

2000

openssl (0.9.6-1) unstable; urgency=low

   * New upstream version (Thanks to Enrique Zanardi <ezanard@debian.org>)
     (closes: #72388)
   * Add support for debian-hurd (closes: #76032)

openssl (0.9.5a-5) unstable; urgency=low

   * move manpages in standard directories with section ssl (closes:
     #72152, #69809)

openssl (0.9.5a-4) unstable; urgency=low

   * include edg_rand_bytes patch from and for apache-ssl

openssl (0.9.5a-3) unstable; urgency=low

   * fix call to dh_makeshlibs to create correct shlibs file and make
     dependend programs link correctly (closes: Bug#61658)
   * include a note in README.debian concerning the location of the
     subcommand manpages (closes: Bug#69809)

openssl (0.9.5a-2) unstable; urgency=low

   * try to fix the sharedlib problem. change soname of library
   (closes: Bug#4622, #66102, #66538, #66123)

openssl (0.9.5a-1) unstable; urgency=low

   * new upstream version (major changes see file NEWS) (closes: Bug#63976,
     #65239, #65358)
   * new library package libssl095a because of probably changed library
     interface (closes: Bug#46222)
   * added architecture mips and mipsel (closes: Bug#62437, #60366)
   * provide shlibs.local file in build to help build if libraries are not
     yet installed (closes: Bug#63984)

openssl (0.9.4-5) frozen unstable; urgency=medium

   * cleanup of move of doc directories to /usr/share/doc (closes:
     Bug#56430)
   * lintian issues (closes: Bug#49358)
   * move demos from openssl to libssl09-dev (closes: Bug#59201)
   * move to debhelpers

openssl (0.9.4-4) unstable; urgency=medium

   * Added 'debian-arm' in 'Configure'. (closes: Bug#54251, #54766)
   * Fixed Configure for 'debian-m68k' (closes: Bug#53636)

1999

openssl (0.9.4-3) unstable; urgency=low

   * define symbol SSLeay_add_ssl_algorithms for backward compatibility
     (closes: Bug#46882)
   * remove manpages from /usr/doc/openssl (closes: Bug#46791)

openssl (0.9.4-2) unstable; urgency=low

   * include some more docu in pod format (Bug #43933)
   * removed -mv8 from sparc flags (Bug #44769)

openssl (0.9.4-1) unstable; urgency=low

   * new upstream version (Closes: #42926)

openssl (0.9.3a-1) unstable; urgency=low

   * new upstream version (Bug #38345, #38627)
   * sparc is big-endian (Bug #39973)

openssl (0.9.2b-3) unstable; urgency=low

   * correct move conffiles to /etc/ssl (Bug #38570)

openssl (0.9.2b-2) unstable; urgency=low

   * added convenience package ssleay to help upgrade to openssl (Bug
     #37185, #37623, #36326)
   * added some missing dependencies from libssl09 (Bug #36681, #35867,
     #36326)
   * move lib*.so to libssl09-dev (Bug #36761)
   * corrected version numbers of library files
   * introduce link from /usr/lib/ssl to /etc/ssl (Bug #36710)

openssl (0.9.2b-1) unstable; urgency=medium

   * First openssl version

ssleay (0.9.0b-2) unstable; urgency=low

   * Include message about the (not)usage of RSAREF (#24409)
   * Move configfiles from /usr/lib/ssl to /etc/ssl (#26406)
   * Change definitions for sparc (#26487)
   * Added missing dependency (#28591)
   * Make debian/libtool executable (#29708)
   * /etc/ssl/lib/ssleay.cnf is now a confile (#32624)

1998

ssleay (0.9.0b-1) unstable; urgency=low

   * new upstream version (Bug #21227, #25971)
   * build shared libraries with -fPIC (Bug #20027)
   * support sparc architecture (Bug #28467)

ssleay (0.8.1-7) frozen unstable; urgency=high

   * security fix patch to 0.8.1b (bug #24022)

ssleay (0.8.1-6) frozen unstable; urgency=low

   * second try to fix bug #15235 (copyright was still missing)

ssleay (0.8.1-5) frozen unstable; urgency=high

   * changed /dev/random to /dev/urandom (Bug #23169, #17817)
   * copyright contains now the full licence (Bug #15235)
   * fixed bug #19410 (md5sums-lists-nonexisting-file)
   * added demos to /usr/doc (Bug #17372)
   * fixed type in package description (Bug #18969)
   * fixed bug in adding documentation (Bug #21463)
   * added patch for support of debian-powerpc (Bug #21579)

1997

ssleay (0.8.1-4) unstable; urgency=low

   * purged dependency from libc5

ssleay (0.8.1-3) unstable; urgency=low

   * changed packagename libssl to libssl08 to get better dependancies

ssleay (0.8.1-2) unstable; urgency=low

   * linked shared libraries against libc6
   * use /dev/random for randomseed

ssleay (0.8.1-1) unstable; urgency=low

   * new upstream version

ssleay (0.6.6-2) unstable; urgency=low

   * cleanup in diffs
   * removed INSTALL from docs (bug #13205)
   * split libssl and libssl-dev (but #13735)

ssleay (0.6.6-1) unstable; urgency=low

   * New upstream version
   * added shared libraries for libcrypto and libssl

ssleay (0.6.4-2) unstable; urgency=low

   * changed doc filenames from .doc to .txt to be able to read them
     over with webbrowser

1996

ssleay (0.6.4-1) unstable; urgency=low

   * Initial Release.