openssl 3.0.8-1 source package in Debian

Changelog

openssl (3.0.8-1) unstable; urgency=medium

  * Import 3.0.7
    - CVE-2023-0401 (NULL dereference during PKCS7 data verification).
    - CVE-2023-0286 (X.400 address type confusion in X.509 GeneralName).
    - CVE-2023-0217 (NULL dereference validating DSA public key).
    - CVE-2023-0216 (Invalid pointer dereference in d2i_PKCS7 functions).
    - CVE-2023-0215 (Use-after-free following BIO_new_NDEF).
    - CVE-2022-4450 (Double free after calling PEM_read_bio_ex).
    - CVE-2022-4304 (Timing Oracle in RSA Decryption).
    - CVE-2022-4203 (X.509 Name Constraints Read Buffer Overflow).
    - Padlock: fix byte swapping assembly for AES-192 and 256
      (Closes: #1029259).
    - Add new symbol.
  * Make loongarch64 little endian (Closes: #1029281).
  * Drop conflict against libssl1.0-dev.
  * Update Standards-Version to 4.6.1. No changes required.

 -- Sebastian Andrzej Siewior <email address hidden>  Tue, 07 Feb 2023 21:42:42 +0100

Upload details

Uploaded by:
Debian OpenSSL Team
Uploaded to:
Sid
Original maintainer:
Debian OpenSSL Team
Architectures:
any all
Section:
libs
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Downloads

File Size SHA-256 Checksum
openssl_3.0.8-1.dsc 2.6 KiB 0f8ac1a4ed55e1e1b70e93a781450273c02cf52aacc0eb70b69586a30ed68261
openssl_3.0.8.orig.tar.gz 14.4 MiB 6c13d2bf38fdf31eac3ce2a347073673f5d63263398f1f69d0df4a41253e4b3e
openssl_3.0.8.orig.tar.gz.asc 833 bytes 565e31cbc436ec4de82c4b526a01caab1cdc9b78d32705f6e0f57666980331ad
openssl_3.0.8-1.debian.tar.xz 73.7 KiB b7b254f67f0f3443fc4441deec2b9bc6d2d24f9168827dd88ff2bab6f370976c

No changes file available.

Binary packages built by this source