Christian Wiese
86f545b40a
openssl: Updated (1.0.0d -> 1.0.0e) (SECURITY: CVE-2011-3207 CVE-2011-3210)
...
Note:
More information about the security fixes can be found here:
http://openssl.org/news/secadv_20110906.txt
13 years ago
Christian Wiese
48ec1ec931
openssl: removed obsolete patches {ripemd,sha}_size_t.patch
14 years ago
Aldas Nabazas
8c3a128d52
massive cache files update from compiling packages <400.000 , ref build 2011-02-07
14 years ago
Aldas Nabazas
1c15f21e13
openssl: Updated (1.0.0c -> 1.0.0d)
14 years ago
Aldas Nabazas
c37736347c
openssl: Updated (1.0.0b -> 1.0.0c)
14 years ago
Aldas Nabazas
dba8a6451a
openssl: enabled md2 for nmap
14 years ago
Aldas Nabazas
19e59878d8
openssl: Updated (1.0.0a -> 1.0.0b)
14 years ago
Aldas Nabazas
0f65e1bd44
openssl: Updated (0.9.8o -> 1.0.0a)
14 years ago
Christian Wiese
cabb33de42
openssl: Removed binutils related patch because the issue was fixed in openssl release 0.9.8m
15 years ago
Christian Wiese
400de09d53
openssl: fixed x86_64 build while using newer binutils/gas which requires sign extention
...
New gas requires sign extention in lea instruction. This resolves md5-x86_64.pl
and sha1-x86_64.pl bugs, but without modifying the code. PR: 2094,2095
http://cvs.openssl.org/chngview?cn=18869
Fix for out range of signed 32bit displacement error on newer binutils in file
sha1-x86_64.pl.
http://cvs.openssl.org/chngview?cn=18864
15 years ago
Christian Wiese
b347aefe83
openssl: Updated (0.9.8n -> 0.9.8o) SECURITY! CVE-2010-1633
...
[IMPORTANT]
An invalid Return value check in pkey_rsa_verifyrecover was discovered. When
verification recovery fails for RSA keys an uninitialised buffer with an
undefined length is returned instead of an error code. This could lead to an
information leak.
original advisory: http://www.openssl.org/news/secadv_20100601.txt
CVE-2010-1633: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1633
15 years ago
Christian Wiese
fd30227eb9
openssl: Updated (0.9.8m -> 0.9.8n) SECURITY! CVE-2010-0740
...
References
----------
This vulnerability is tracked as CVE-2010-0740.
URL for this Security Advisory:
http://www.openssl.org/news/secadv_20100324.txt
15 years ago
Alejandro Mery
6f3bb12a2c
openssl: Updated (0.9.8l -> 0.9.8m) - SECURITY
15 years ago
Alejandro Mery
b4091f3692
openssl: Updated (0.9.8k -> 0.9.8l)
15 years ago
Alejandro Mery
3058b42617
openssl: updated download location
16 years ago
Alejandro Mery
fd5385da83
openssl: Updated (0.9.8j -> 0.9.8k) - SECURITY
...
http://www.openssl.org/news/secadv_20090325.txt
16 years ago
Alejandro Mery
fbdd53ef13
openssl: Updated (0.9.8i -> 0.9.8j) - SECURITY
16 years ago
Aldas Nabazas
8c81f02dac
openssl: Updated (0.9.8h -> 0.9.8i)
17 years ago
Aldas Nabazas
77aa0935f4
openssl: Updated (0.9.8g -> 0.9.8h) : SECURITY - MEDIUM
...
CVE-2008-1678 (Medium) :
Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f
through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via
multiple calls, as demonstrated by initial SSL client handshakes to the Apache HTTP Server
mod_ssl that specify a compression algorithm.
17 years ago
Alejandro Mery
98010b4d95
[openssl] Marked to build on stage 1 when cross compiling
17 years ago
Alejandro Mery
d8cf15a66c
Regenerated copyright notes broadly, without renewing them.
17 years ago
Alejandro Mery
d15769f41d
Removed trailing spaces massively, hoping to not break anything. Copyright notes not renewed
17 years ago
Christian Wiese
9132fd91d4
Took over maintainship of openssl package
17 years ago
Christian Wiese
53d97437eb
Updated openssl (0.9.8d -> 0.9.8g)
17 years ago
Alejandro Mery
0b9e401255
Removed #! lines from .conf files
18 years ago
Alejandro Mery
12b79fecfa
* relocated current package database to the trunk of the package sub-project
...
git-svn-id: svn://svn.opensde.net/opensde/package/trunk@20072 10447126-35f2-4685-b0cf-6dd780d3921f
18 years ago