openssl-1.0.1e-58.el6_10.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2019-07-01):
- fix CVE-2019-1559 - 0-byte record padding oracle
|
openssl-1.0.1e-58.el6_10.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2019-07-01):
- fix CVE-2019-1559 - 0-byte record padding oracle
|
openssl-1.0.1e-48.sl6_8.4.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2017-02-06):
- fix CVE-2017-3731 - DoS via truncated packets with RC4-MD5 cipher
- fix CVE-2016-8610 - DoS of single-threaded servers via excessive alerts
|
openssl-1.0.1e-48.sl6_8.4.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2017-02-06):
- fix CVE-2017-3731 - DoS via truncated packets with RC4-MD5 cipher
- fix CVE-2016-8610 - DoS of single-threaded servers via excessive alerts
|
openssl-1.0.1e-48.sl6_8.3.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2016-09-22):
- fix CVE-2016-2177 - possible integer overflow
- fix CVE-2016-2178 - non-constant time DSA operations
- fix CVE-2016-2179 - further DoS issues in DTLS
- fix CVE-2016-2180 - OOB read in TS_OBJ_print_bio()
- fix CVE-2016-2181 - DTLS1 replay protection and unprocessed records issue
- fix CVE-2016-2182 - possible buffer overflow in BN_bn2dec()
- fix CVE-2016-6302 - insufficient TLS session ticket HMAC length check
- fix CVE-2016-6304 - unbound memory growth with OCSP status request
- fix CVE-2016-6306 - certificate message OOB reads
- mitigate CVE-2016-2183 - degrade all 64bit block ciphers and RC4 to
112 bit effective strength
- replace expired testing certificates
|
openssl-1.0.1e-48.sl6_8.3.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2016-09-22):
- fix CVE-2016-2177 - possible integer overflow
- fix CVE-2016-2178 - non-constant time DSA operations
- fix CVE-2016-2179 - further DoS issues in DTLS
- fix CVE-2016-2180 - OOB read in TS_OBJ_print_bio()
- fix CVE-2016-2181 - DTLS1 replay protection and unprocessed records issue
- fix CVE-2016-2182 - possible buffer overflow in BN_bn2dec()
- fix CVE-2016-6302 - insufficient TLS session ticket HMAC length check
- fix CVE-2016-6304 - unbound memory growth with OCSP status request
- fix CVE-2016-6306 - certificate message OOB reads
- mitigate CVE-2016-2183 - degrade all 64bit block ciphers and RC4 to
112 bit effective strength
- replace expired testing certificates
|
openssl-1.0.1e-48.sl6_8.1.x86_64
[1.5 MiB] |
Changelog
by Connie Sieh (2016-05-18):
- backport upstream commit to replace expired testing certificates
for S/MIME tests (#1335097)
|
openssl-1.0.1e-48.sl6_8.1.i686
[1.5 MiB] |
Changelog
by Connie Sieh (2016-05-18):
- backport upstream commit to replace expired testing certificates
for S/MIME tests (#1335097)
|
openssl-1.0.1e-48.el6_8.4.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2017-02-06):
- fix CVE-2017-3731 - DoS via truncated packets with RC4-MD5 cipher
- fix CVE-2016-8610 - DoS of single-threaded servers via excessive alerts
|
openssl-1.0.1e-48.el6_8.4.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2017-02-06):
- fix CVE-2017-3731 - DoS via truncated packets with RC4-MD5 cipher
- fix CVE-2016-8610 - DoS of single-threaded servers via excessive alerts
|
openssl-1.0.1e-48.el6_8.1.i686
[1.5 MiB] |
Changelog
by Connie Sieh (2016-05-18):
- backport upstream commit to replace expired testing certificates
for S/MIME tests (#1335097)
- Not changing version since next RHEL version will need this
|
openssl-1.0.1e-48.el6_8.1.x86_64
[1.5 MiB] |
Changelog
by Connie Sieh (2016-05-18):
- backport upstream commit to replace expired testing certificates
for S/MIME tests (#1335097)
- Not changing version since next RHEL version will need this
|
openssl-1.0.1e-42.el6_7.4.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2016-02-24):
- fix CVE-2016-0702 - side channel attack on modular exponentiation
- fix CVE-2016-0705 - double-free in DSA private key parsing
- fix CVE-2016-0797 - heap corruption in BN_hex2bn and BN_dec2bn
|
openssl-1.0.1e-42.el6_7.4.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2016-02-24):
- fix CVE-2016-0702 - side channel attack on modular exponentiation
- fix CVE-2016-0705 - double-free in DSA private key parsing
- fix CVE-2016-0797 - heap corruption in BN_hex2bn and BN_dec2bn
|
openssl-1.0.1e-42.el6_7.2.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2015-12-21):
- fix CVE-2015-7575 - disallow use of MD5 in TLS1.2
|
openssl-1.0.1e-42.el6_7.2.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2015-12-21):
- fix CVE-2015-7575 - disallow use of MD5 in TLS1.2
|
openssl-1.0.1e-42.el6_7.1.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2015-12-04):
- fix CVE-2015-3194 - certificate verify crash with missing PSS parameter
- fix CVE-2015-3195 - X509_ATTRIBUTE memory leak
- fix CVE-2015-3196 - race condition when handling PSK identity hint
|
openssl-1.0.1e-42.el6_7.1.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2015-12-04):
- fix CVE-2015-3194 - certificate verify crash with missing PSS parameter
- fix CVE-2015-3195 - X509_ATTRIBUTE memory leak
- fix CVE-2015-3196 - race condition when handling PSK identity hint
|
openssl-1.0.1e-30.el6_6.11.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2015-06-11):
- improved fix for CVE-2015-1791
- add missing parts of CVE-2015-0209 fix for corectness although unexploitable
|
openssl-1.0.1e-30.el6_6.11.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2015-06-11):
- improved fix for CVE-2015-1791
- add missing parts of CVE-2015-0209 fix for corectness although unexploitable
|
openssl-1.0.1e-30.el6_6.9.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2015-05-25):
- fix CVE-2015-4000 - prevent the logjam attack on client - restrict
the DH key size to at least 768 bits (limit will be increased in future)
|
openssl-1.0.1e-30.el6_6.9.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2015-05-25):
- fix CVE-2015-4000 - prevent the logjam attack on client - restrict
the DH key size to at least 768 bits (limit will be increased in future)
|
openssl-1.0.1e-30.el6_6.7.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2015-03-19):
- update fix for CVE-2015-0287 to what was released upstream
|
openssl-1.0.1e-30.el6_6.7.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2015-03-19):
- update fix for CVE-2015-0287 to what was released upstream
|
openssl-1.0.1e-30.el6_6.5.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2015-01-13):
- fix CVE-2014-3570 - incorrect computation in BN_sqr()
- fix CVE-2014-3571 - possible crash in dtls1_get_record()
- fix CVE-2014-3572 - possible downgrade of ECDH ciphersuite to non-PFS state
- fix CVE-2014-8275 - various certificate fingerprint issues
- fix CVE-2015-0204 - remove support for RSA ephemeral keys for non-export
ciphersuites and on server
- fix CVE-2015-0205 - do not allow unauthenticated client DH certificate
- fix CVE-2015-0206 - possible memory leak when buffering DTLS records
|
openssl-1.0.1e-30.el6_6.5.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2015-01-13):
- fix CVE-2014-3570 - incorrect computation in BN_sqr()
- fix CVE-2014-3571 - possible crash in dtls1_get_record()
- fix CVE-2014-3572 - possible downgrade of ECDH ciphersuite to non-PFS state
- fix CVE-2014-8275 - various certificate fingerprint issues
- fix CVE-2015-0204 - remove support for RSA ephemeral keys for non-export
ciphersuites and on server
- fix CVE-2015-0205 - do not allow unauthenticated client DH certificate
- fix CVE-2015-0206 - possible memory leak when buffering DTLS records
|
openssl-1.0.1e-30.el6_6.2.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2014-10-15):
- fix CVE-2014-3567 - memory leak when handling session tickets
- fix CVE-2014-3513 - memory leak in srtp support
- add support for fallback SCSV to partially mitigate CVE-2014-3566
(padding attack on SSL3)
|
openssl-1.0.1e-30.el6_6.2.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2014-10-15):
- fix CVE-2014-3567 - memory leak when handling session tickets
- fix CVE-2014-3513 - memory leak in srtp support
- add support for fallback SCSV to partially mitigate CVE-2014-3566
(padding attack on SSL3)
|
openssl-1.0.1e-16.el6_5.15.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2014-08-08):
- fix CVE-2014-3505 - doublefree in DTLS packet processing
- fix CVE-2014-3506 - avoid memory exhaustion in DTLS
- fix CVE-2014-3507 - avoid memory leak in DTLS
- fix CVE-2014-3508 - fix OID handling to avoid information leak
- fix CVE-2014-3509 - fix race condition when parsing server hello
- fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS
- fix CVE-2014-3511 - disallow protocol downgrade via fragmentation
|
openssl-1.0.1e-16.el6_5.15.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2014-08-08):
- fix CVE-2014-3505 - doublefree in DTLS packet processing
- fix CVE-2014-3506 - avoid memory exhaustion in DTLS
- fix CVE-2014-3507 - avoid memory leak in DTLS
- fix CVE-2014-3508 - fix OID handling to avoid information leak
- fix CVE-2014-3509 - fix race condition when parsing server hello
- fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS
- fix CVE-2014-3511 - disallow protocol downgrade via fragmentation
|
openssl-1.0.1e-16.el6_5.14.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2014-06-02):
- fix CVE-2010-5298 - possible use of memory after free
- fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment
- fix CVE-2014-0198 - possible NULL pointer dereference
- fix CVE-2014-0221 - DoS from invalid DTLS handshake packet
- fix CVE-2014-0224 - SSL/TLS MITM vulnerability
- fix CVE-2014-3470 - client-side DoS when using anonymous ECDH
|
openssl-1.0.1e-16.el6_5.14.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2014-06-02):
- fix CVE-2010-5298 - possible use of memory after free
- fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment
- fix CVE-2014-0198 - possible NULL pointer dereference
- fix CVE-2014-0221 - DoS from invalid DTLS handshake packet
- fix CVE-2014-0224 - SSL/TLS MITM vulnerability
- fix CVE-2014-3470 - client-side DoS when using anonymous ECDH
|
openssl-1.0.1e-16.el6_5.7.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2014-04-07):
- fix CVE-2014-0160 - information disclosure in TLS heartbeat extension
|
openssl-1.0.1e-16.el6_5.7.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2014-04-07):
- fix CVE-2014-0160 - information disclosure in TLS heartbeat extension
|
openssl-1.0.1e-16.el6_5.4.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2014-01-07):
- fix CVE-2013-4353 - Invalid TLS handshake crash
|
openssl-1.0.1e-16.el6_5.4.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2014-01-07):
- fix CVE-2013-4353 - Invalid TLS handshake crash
|
openssl-1.0.1e-16.el6_5.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2013-10-31):
- do not advertise ECC curves we do not support
- fix CPU identification on Cyrix CPUs
|
openssl-1.0.1e-16.el6_5.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2013-10-31):
- do not advertise ECC curves we do not support
- fix CPU identification on Cyrix CPUs
|
openssl-1.0.1e-15.el6.i686
[1.5 MiB] |
Changelog
by Tomáš Mráz (2013-09-27):
- make DTLS1 work in FIPS mode
- avoid RSA and DSA 512 bits and Whirlpool in 'openssl speed' in FIPS mode
|
openssl-1.0.1e-15.el6.x86_64
[1.5 MiB] |
Changelog
by Tomáš Mráz (2013-09-27):
- make DTLS1 work in FIPS mode
- avoid RSA and DSA 512 bits and Whirlpool in 'openssl speed' in FIPS mode
|
openssl-1.0.0-27.el6_4.2.x86_64
[1.4 MiB] |
Changelog
by Tomas Mraz (2013-02-25):
- fix for CVE-2013-0169 - SSL/TLS CBC timing attack (#907589)
- fix for CVE-2013-0166 - DoS in OCSP signatures checking (#908052)
- enable compression only if explicitly asked for or OPENSSL_DEFAULT_ZLIB
environment variable is set (fixes CVE-2012-4929 #857051)
- use __secure_getenv() everywhere instead of getenv() (#839735)
|
openssl-1.0.0-27.el6_4.2.i686
[1.4 MiB] |
Changelog
by Tomas Mraz (2013-02-25):
- fix for CVE-2013-0169 - SSL/TLS CBC timing attack (#907589)
- fix for CVE-2013-0166 - DoS in OCSP signatures checking (#908052)
- enable compression only if explicitly asked for or OPENSSL_DEFAULT_ZLIB
environment variable is set (fixes CVE-2012-4929 #857051)
- use __secure_getenv() everywhere instead of getenv() (#839735)
|
openssl-1.0.0-20.el6_2.5.x86_64
[1.4 MiB] |
Changelog
by Tomas Mraz (2012-05-15):
- fix for CVE-2012-2333 - improper checking for record length in DTLS (#820686)
- properly initialize tkeylen in the CVE-2012-0884 fix
|
openssl-1.0.0-20.el6_2.5.i686
[1.4 MiB] |
Changelog
by Tomas Mraz (2012-05-15):
- fix for CVE-2012-2333 - improper checking for record length in DTLS (#820686)
- properly initialize tkeylen in the CVE-2012-0884 fix
|
openssl-1.0.0-20.el6_2.4.i686
[1.4 MiB] |
Changelog
by Tomas Mraz (2012-04-19):
- fix for CVE-2012-2110 - memory corruption in asn1_d2i_read_bio() (#814185)
|
openssl-1.0.0-20.el6_2.4.x86_64
[1.4 MiB] |
Changelog
by Tomas Mraz (2012-04-19):
- fix for CVE-2012-2110 - memory corruption in asn1_d2i_read_bio() (#814185)
|
openssl-1.0.0-20.el6_2.3.x86_64
[1.4 MiB] |
Changelog
by Tomas Mraz (2012-03-19):
- fix problem with the SGC restart patch that might terminate handshake
incorrectly
- fix for CVE-2012-0884 - MMA weakness in CMS and PKCS#7 code (#802725)
- fix for CVE-2012-1165 - NULL read dereference on bad MIME headers (#802489)
|
openssl-1.0.0-20.el6_2.3.i686
[1.4 MiB] |
Changelog
by Tomas Mraz (2012-03-19):
- fix problem with the SGC restart patch that might terminate handshake
incorrectly
- fix for CVE-2012-0884 - MMA weakness in CMS and PKCS#7 code (#802725)
- fix for CVE-2012-1165 - NULL read dereference on bad MIME headers (#802489)
|
openssl-1.0.0-20.el6_2.1.i686
[1.4 MiB] |
Changelog
by Tomas Mraz (2012-01-19):
- fix for CVE-2011-4108 & CVE-2012-0050 - DTLS plaintext recovery
vulnerability and additional DTLS fixes (#771770)
- fix for CVE-2011-4576 - uninitialized SSL 3.0 padding (#771775)
- fix for CVE-2011-4577 - possible DoS through malformed RFC 3779 data (#771778)
- fix for CVE-2011-4619 - SGC restart DoS attack (#771780)
|
openssl-1.0.0-20.el6_2.1.x86_64
[1.4 MiB] |
Changelog
by Tomas Mraz (2012-01-19):
- fix for CVE-2011-4108 & CVE-2012-0050 - DTLS plaintext recovery
vulnerability and additional DTLS fixes (#771770)
- fix for CVE-2011-4576 - uninitialized SSL 3.0 padding (#771775)
- fix for CVE-2011-4577 - possible DoS through malformed RFC 3779 data (#771778)
- fix for CVE-2011-4619 - SGC restart DoS attack (#771780)
|
openssl-1.0.0-10.el6_1.5.x86_64
[1.4 MiB] |
Changelog
by Tomas Mraz (2011-10-17):
- initialize the X509_STORE_CTX properly for CRL lookups - CVE-2011-3207
(#736087)
|
openssl-1.0.0-10.el6_1.5.i686
[1.4 MiB] |
Changelog
by Tomas Mraz (2011-10-17):
- initialize the X509_STORE_CTX properly for CRL lookups - CVE-2011-3207
(#736087)
|