-
openssl (1.0.2g-1ubuntu4.20) xenial-security; urgency=medium
* Enable X509_V_FLAG_TRUSTED_FIRST by default, such that letsencrypt
connection with the default chain remains trusted even after the
expiry of the redundant CA certificate. LP: #1928989
-- Dimitri John Ledkov <email address hidden> Mon, 28 Jun 2021 14:05:36 +0100
-
openssl (1.0.2g-1ubuntu4.19) xenial-security; urgency=medium
* SECURITY UPDATE: Integer overflow in CipherUpdate
- debian/patches/CVE-2021-23840-pre1.patch: add new EVP error codes in
crypto/evp/evp_err.c, crypto/evp/evp.h.
- debian/patches/CVE-2021-23840-pre2.patch: add a new EVP error code in
crypto/evp/evp_err.c, crypto/evp/evp.h.
- debian/patches/CVE-2021-23840.patch: don't overflow the output length
in EVP_CipherUpdate calls in crypto/evp/evp_enc.c,
crypto/evp/evp_err.c, crypto/evp/evp.h.
- CVE-2021-23840
* SECURITY UPDATE: Null pointer deref in X509_issuer_and_serial_hash()
- debian/patches/CVE-2021-23841.patch: fix Null pointer deref in
crypto/x509/x509_cmp.c.
- CVE-2021-23841
-- Marc Deslauriers <email address hidden> Wed, 17 Feb 2021 08:14:40 -0500
-
openssl (1.0.2g-1ubuntu4.18) xenial-security; urgency=medium
* SECURITY UPDATE: EDIPARTYNAME NULL pointer de-ref
- debian/patches/CVE-2020-1971-1.patch: use explicit tagging for
DirectoryString in crypto/x509v3/v3_genn.c.
- debian/patches/CVE-2020-1971-2.patch: correctly compare EdiPartyName
in crypto/x509v3/v3_genn.c.
- debian/patches/CVE-2020-1971-3.patch: check that multi-strings/CHOICE
types don't use implicit tagging in crypto/asn1/asn1_err.c,
crypto/asn1/tasn_dec.c, crypto/asn1/asn1.h.
- debian/patches/CVE-2020-1971-4.patch: complain if we are attempting
to encode with an invalid ASN.1 template in crypto/asn1/asn1_err.c,
crypto/asn1/tasn_enc.c, crypto/asn1/asn1.h.
- debian/patches/CVE-2020-1971-5.patch: add a test for GENERAL_NAME_cmp
in crypto/x509v3/v3nametest.c.
- CVE-2020-1971
-- Marc Deslauriers <email address hidden> Wed, 02 Dec 2020 10:43:58 -0500
-
openssl (1.0.2g-1ubuntu4.17) xenial-security; urgency=medium
* SECURITY UPDATE: Raccoon Attack
- debian/patches/CVE-2020-1968.patch: disable ciphers that reuse the
DH secret across multiple TLS connections in ssl/s3_lib.c.
- CVE-2020-1968
-- Marc Deslauriers <email address hidden> Tue, 15 Sep 2020 14:13:51 -0400
-
openssl (1.0.2g-1ubuntu4.16) xenial-security; urgency=medium
* SECURITY UPDATE: ECDSA remote timing attack
- debian/patches/CVE-2019-1547.patch: for ECC parameters with NULL or
zero cofactor, compute it in crypto/ec/ec.h, crypto/ec/ec_err.c,
crypto/ec/ec_lib.c.
- CVE-2019-1547
* SECURITY UPDATE: rsaz_512_sqr overflow bug on x86_64
- debian/patches/CVE-2019-1551.patch: fix an overflow bug in
rsaz_512_sqr in crypto/bn/asm/rsaz-x86_64.pl.
- CVE-2019-1551
* SECURITY UPDATE: Padding Oracle issue
- debian/patches/CVE-2019-1563.patch: fix a padding oracle in
PKCS7_dataDecode and CMS_decrypt_set1_pkey in crypto/cms/cms_env.c,
crypto/cms/cms_lcl.h, crypto/cms/cms_smime.c,
crypto/pkcs7/pk7_doit.c.
- CVE-2019-1563
-- Marc Deslauriers <email address hidden> Wed, 27 May 2020 15:17:49 -0400
-
openssl (1.0.2g-1ubuntu4.15) xenial-security; urgency=medium
* SECURITY UPDATE: 0-byte record padding oracle
- debian/patches/CVE-2019-1559.patch: go into the error state if a
fatal alert is sent or received in ssl/d1_pkt.c, ssl/s3_pkt.c.
- CVE-2019-1559
-- Marc Deslauriers <email address hidden> Tue, 26 Feb 2019 13:16:01 -0500
-
openssl (1.0.2g-1ubuntu4.14) xenial-security; urgency=medium
* SECURITY UPDATE: PortSmash side channel attack
- debian/patches/CVE-2018-5407.patch: fix timing vulnerability in
crypto/bn/bn_lib.c, crypto/ec/ec_mult.c.
- CVE-2018-5407
* SECURITY UPDATE: timing side channel attack in DSA
- debian/patches/CVE-2018-0734-pre1.patch: address a timing side
channel in crypto/dsa/dsa_ossl.c.
- debian/patches/CVE-2018-0734-1.patch: fix timing vulnerability in
crypto/dsa/dsa_ossl.c.
- debian/patches/CVE-2018-0734-2.patch: fix mod inverse in
crypto/dsa/dsa_ossl.c.
- debian/patches/CVE-2018-0734-3.patch: add a constant time flag in
crypto/dsa/dsa_ossl.c.
- CVE-2018-0734
-- Marc Deslauriers <email address hidden> Tue, 04 Dec 2018 08:38:18 -0500
-
openssl (1.0.2g-1ubuntu4.13) xenial-security; urgency=medium
* SECURITY UPDATE: ECDSA key extraction side channel
- debian/patches/CVE-2018-0495.patch: add blinding to an ECDSA
signature in crypto/ecdsa/ecdsatest.c, crypto/ecdsa/ecs_ossl.c.
- CVE-2018-0495
* SECURITY UPDATE: denial of service via long prime values
- debian/patches/CVE-2018-0732.patch: reject excessively large primes
in DH key generation in crypto/dh/dh_key.c.
- CVE-2018-0732
* SECURITY UPDATE: RSA cache timing side channel attack
(previous update was incomplete)
- debian/patches/CVE-2018-0737-1.patch: replaced variable-time GCD in
crypto/rsa/rsa_gen.c.
- debian/patches/CVE-2018-0737-2.patch: used ERR set/pop mark in
crypto/rsa/rsa_gen.c.
- debian/patches/CVE-2018-0737-3.patch: consttime flag changed in
crypto/rsa/rsa_gen.c.
- debian/patches/CVE-2018-0737-4.patch: ensure BN_mod_inverse and
BN_mod_exp_mont both get called with BN_FLG_CONSTTIME flag set in
crypto/rsa/rsa_gen.c.
- CVE-2018-0737
-- Marc Deslauriers <email address hidden> Wed, 20 Jun 2018 07:38:22 -0400
-
openssl (1.0.2g-1ubuntu4.12) xenial-security; urgency=medium
* SECURITY UPDATE: Cache timing side channel
- debian/patches/CVE-2018-0737.patch: ensure BN_mod_inverse
and BN_mod_exp_mont get called with BN_FLG_CONSTTIME flag set
in crypto/rsa/rsa_gen.c.
- CVE-2018-0737
-- <email address hidden> (Leonidas S. Barbosa) Wed, 18 Apr 2018 15:35:17 -0300
-
openssl (1.0.2g-1ubuntu4.11) xenial-security; urgency=medium
* SECURITY UPDATE: DoS via ASN.1 types with a recursive definition
- debian/patches/CVE-2018-0739.patch: limit stack depth in
crypto/asn1/asn1.h, crypto/asn1/asn1_err.c, crypto/asn1/tasn_dec.c.
- CVE-2018-0739
-- Marc Deslauriers <email address hidden> Tue, 27 Mar 2018 14:18:33 -0400
-
openssl (1.0.2g-1ubuntu4.10) xenial-security; urgency=medium
* SECURITY UPDATE: Read/write after SSL object in error state
- debian/patches/CVE-2017-3737-pre.patch: add test/ssltestlib.*,
add to test/Makefile.
- debian/patches/CVE-2017-3737-1.patch: don't allow read/write after
fatal error in ssl/ssl.h.
- debian/patches/CVE-2017-3737-2.patch: add test to ssl/Makefile,
ssl/fatalerrtest.c, test/Makefile.
- CVE-2017-3737
* SECURITY UPDATE: rsaz_1024_mul_avx2 overflow bug on x86_64
- debian/patches/CVE-2017-3738.patch: fix digit correction bug in
crypto/bn/asm/rsaz-avx2.pl.
- CVE-2017-3738
-- Marc Deslauriers <email address hidden> Thu, 07 Dec 2017 13:17:37 -0500
-
openssl (1.0.2g-1ubuntu4.9) xenial-security; urgency=medium
* SECURITY UPDATE: Malformed X.509 IPAddressFamily could cause OOB read
- debian/patches/CVE-2017-3735.patch: avoid out-of-bounds read in
crypto/x509v3/v3_addr.c.
- CVE-2017-3735
* SECURITY UPDATE: bn_sqrx8x_internal carry bug on x86_64
- debian/patches/CVE-2017-3736.patch: fix carry bug in
bn_sqrx8x_internal in crypto/bn/asm/x86_64-mont5.pl.
- CVE-2017-3736
-- Marc Deslauriers <email address hidden> Thu, 02 Nov 2017 11:28:46 -0400
-
openssl (1.0.2g-1ubuntu4.8) xenial; urgency=medium
* aes/asm/aesni-sha*-x86_64.pl: fix IV handling in SHAEXT paths.
(LP: #1674399)
-- William Grant <email address hidden> Fri, 19 May 2017 18:27:58 +1000
-
openssl (1.0.2g-1ubuntu4.7) xenial; urgency=medium
* crypto/x86*cpuid.pl: move extended feature detection. (LP: #1674399)
This fix moves extended feature detection past basic feature
detection where it belongs. 32-bit counterpart is harmonized too.
-- Eric Desrochers <email address hidden> Wed, 26 Apr 2017 09:08:02 -0400
-
openssl (1.0.2g-1ubuntu4.6) xenial-security; urgency=medium
* SECURITY UPDATE: Montgomery multiplication may produce incorrect
results
- debian/patches/CVE-2016-7055.patch: fix logic in
crypto/bn/asm/x86_64-mont.pl.
- CVE-2016-7055
* SECURITY UPDATE: DoS via warning alerts
- debian/patches/CVE-2016-8610.patch: don't allow too many consecutive
warning alerts in ssl/d1_pkt.c, ssl/s3_pkt.c, ssl/ssl.h,
ssl/ssl_locl.h.
- debian/patches/CVE-2016-8610-2.patch: fail if an unrecognised record
type is received in ssl/s3_pkt.c.
- CVE-2016-8610
* SECURITY UPDATE: Truncated packet could crash via OOB read
- debian/patches/CVE-2017-3731.patch: harden RC4_MD5 cipher in
crypto/evp/e_rc4_hmac_md5.c.
- CVE-2017-3731
* SECURITY UPDATE: BN_mod_exp may produce incorrect results on x86_64
- debian/patches/CVE-2017-3732.patch: fix carry bug in
bn_sqr8x_internal in crypto/bn/asm/x86_64-mont5.pl.
- CVE-2017-3732
-- Marc Deslauriers <email address hidden> Mon, 30 Jan 2017 10:31:12 -0500
-
openssl (1.0.2g-1ubuntu4.5) xenial-security; urgency=medium
* SECURITY REGRESSION: incomplete fix for CVE-2016-2182 (LP: #1626883)
- debian/patches/CVE-2016-2182-2.patch: fix off-by-one in overflow
check in crypto/bn/bn_print.c.
-- Marc Deslauriers <email address hidden> Fri, 23 Sep 2016 08:00:13 -0400
-
openssl (1.0.2g-1ubuntu4.4) xenial-security; urgency=medium
* SECURITY UPDATE: Pointer arithmetic undefined behaviour
- debian/patches/CVE-2016-2177.patch: avoid undefined pointer
arithmetic in ssl/s3_srvr.c, ssl/ssl_sess.c, ssl/t1_lib.c.
- CVE-2016-2177
* SECURITY UPDATE: Constant time flag not preserved in DSA signing
- debian/patches/CVE-2016-2178-*.patch: preserve BN_FLG_CONSTTIME in
crypto/dsa/dsa_ossl.c.
- CVE-2016-2178
* SECURITY UPDATE: DTLS buffered message DoS
- debian/patches/CVE-2016-2179.patch: fix queue handling in
ssl/d1_both.c, ssl/d1_clnt.c, ssl/d1_lib.c, ssl/d1_srvr.c,
ssl/ssl_locl.h.
- CVE-2016-2179
* SECURITY UPDATE: OOB read in TS_OBJ_print_bio()
- debian/patches/CVE-2016-2180.patch: fix text handling in
crypto/ts/ts_lib.c.
- CVE-2016-2180
* SECURITY UPDATE: DTLS replay protection DoS
- debian/patches/CVE-2016-2181-1.patch: properly handle unprocessed
records in ssl/d1_pkt.c.
- debian/patches/CVE-2016-2181-2.patch: protect against replay attacks
in ssl/d1_pkt.c, ssl/ssl.h, ssl/ssl_err.c.
- debian/patches/CVE-2016-2181-3.patch: update error code in ssl/ssl.h.
- CVE-2016-2181
* SECURITY UPDATE: OOB write in BN_bn2dec()
- debian/patches/CVE-2016-2182.patch: don't overflow buffer in
crypto/bn/bn_print.c.
- CVE-2016-2182
* SECURITY UPDATE: SWEET32 Mitigation
- debian/patches/CVE-2016-2183.patch: move DES ciphersuites from HIGH
to MEDIUM in ssl/s3_lib.c.
- CVE-2016-2183
* SECURITY UPDATE: Malformed SHA512 ticket DoS
- debian/patches/CVE-2016-6302.patch: sanity check ticket length in
ssl/t1_lib.c.
- CVE-2016-6302
* SECURITY UPDATE: OOB write in MDC2_Update()
- debian/patches/CVE-2016-6303.patch: avoid overflow in
crypto/mdc2/mdc2dgst.c.
- CVE-2016-6303
* SECURITY UPDATE: OCSP Status Request extension unbounded memory growth
- debian/patches/CVE-2016-6304.patch: remove OCSP_RESPIDs from previous
handshake in ssl/t1_lib.c.
- CVE-2016-6304
* SECURITY UPDATE: Certificate message OOB reads
- debian/patches/CVE-2016-6306-1.patch: check lengths in ssl/s3_clnt.c,
ssl/s3_srvr.c.
- debian/patches/CVE-2016-6306-2.patch: make message buffer slightly
larger in ssl/d1_both.c, ssl/s3_both.c.
- CVE-2016-6306
-- Marc Deslauriers <email address hidden> Thu, 22 Sep 2016 08:22:22 -0400
-
openssl (1.0.2g-1ubuntu4.3) xenial; urgency=medium
* Remove incomplete FIPS patches for now. (LP: #1614210)
(related bugs: LP: #1594748, LP: #1593953, LP: #1591797, LP: #1588524)
- debian/patches/*fips*.patch: removed.
- debian/rules: removed fips from CONFARGS.
-- Marc Deslauriers <email address hidden> Fri, 19 Aug 2016 13:03:55 -0400
-
openssl (1.0.2g-1ubuntu4.2) xenial; urgency=medium
* Cherry-pick s390x assembly pack bugfix to cache capability query
results for improved performance. LP: #1601836.
* Enable asm optimisations on s390x. LP: #1602655.
-- Dimitri John Ledkov <email address hidden> Thu, 28 Jul 2016 15:37:07 +0300
-
openssl (1.0.2g-1ubuntu4.1) xenial-security; urgency=medium
* SECURITY UPDATE: EVP_EncodeUpdate overflow
- debian/patches/CVE-2016-2105.patch: properly check lengths in
crypto/evp/encode.c, add documentation to
doc/crypto/EVP_EncodeInit.pod, doc/crypto/evp.pod.
- CVE-2016-2105
* SECURITY UPDATE: EVP_EncryptUpdate overflow
- debian/patches/CVE-2016-2106.patch: fix overflow in
crypto/evp/evp_enc.c.
- CVE-2016-2106
* SECURITY UPDATE: Padding oracle in AES-NI CBC MAC check
- debian/patches/CVE-2016-2107.patch: check that there are enough
padding characters in crypto/evp/e_aes_cbc_hmac_sha1.c,
crypto/evp/e_aes_cbc_hmac_sha256.c.
- CVE-2016-2107
* SECURITY UPDATE: Memory corruption in the ASN.1 encoder
- debian/patches/CVE-2016-2108.patch: fix ASN1_INTEGER handling in
crypto/asn1/a_type.c, crypto/asn1/asn1.h, crypto/asn1/tasn_dec.c,
crypto/asn1/tasn_enc.c.
- CVE-2016-2108
* SECURITY UPDATE: ASN.1 BIO excessive memory allocation
- debian/patches/CVE-2016-2109.patch: properly handle large amounts of
data in crypto/asn1/a_d2i_fp.c.
- CVE-2016-2109
-- Marc Deslauriers <email address hidden> Thu, 28 Apr 2016 09:15:39 -0400
-
openssl (1.0.2g-1ubuntu4) xenial; urgency=medium
* Rename Fedora-imported FIPS patches to the names they have in Fedora, add
correct "Origin:" tags, and move Ubuntu modifications in them into
openssl-1.0.2g-ubuntu-fips-cleanup.patch.
-- Joy Latten <email address hidden> Fri, 15 Apr 2016 06:58:01 +0200
-
openssl (1.0.2g-1ubuntu3) xenial; urgency=medium
* Add fips support to openssl, LP: #1553309
- debian/patches/openssl-1.0.2g-fips.patch: [PATCH 1/6] Add selftest, fips
support, crypto compliance and define OPENSSL_FIPS.
- debian/patches/openssl-1.0.2g-fips-ec.patch: [PATCH 2/6] Add fips compliance
for EC curves.
- debian/patches/openssl-1.0.2g-fips-md5-allow.patch: [PATCH 3/6] Allow md5 in
fips mode.
- debian/patches/openssl-1.0.2g-fips-ctor.patch: [PATCH 4/6] Re-factor integrity
check for fips mode.
- debian/patches/openssl-1.0.2g-new-fips-reqs.patch: [PATCH 5/6] New fips
requirements.
- debian/patches/openssl-1.0.2g-ubuntu-fips-cleanup.patch: [PATCH 6/6] Cleanup
compiler warnings, use upstream error codes, DSA, DSA2, fips_utl.h; add
additional upstream tests to fips_test_suite; allow all EC curves.
-- Joy Latten <email address hidden> Tue, 12 Apr 2016 15:33:50 -0500
-
openssl (1.0.2g-1ubuntu2) xenial; urgency=medium
* debian/patches/arm64-aarch64_asm.patch: Enable aarch64 asm routines
(LP: #1552939).
-- dann frazier <email address hidden> Mon, 07 Mar 2016 10:03:26 -0700
-
openssl (1.0.2g-1ubuntu1) xenial; urgency=medium
* Merge with Debian, remaining changes.
- Disable SSLv3 without changing ABI:
+ debian/patches/no-sslv3.patch: Disable SSLv3 without using the
no-ssl3-method option
+ debian/rules: don't use no-ssl3-method, don't bump soname
+ debian/patches/engines-path.patch: don't bump soname
+ debian/patches/version-script.patch: don't bump soname
+ debian/patches/soname.patch: removed
+ debian/lib*: don't bump soname
- debian/control: don't enable rfc3779 and cms support for now as it
changes ABI.
- debian/libssl1.0.0.postinst:
+ Display a system restart required notification on libssl1.0.0
upgrade on servers.
+ Use a different priority for libssl1.0.0/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
in Debian).
- debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
rules}: Move runtime libraries to /lib, for the benefit of
wpasupplicant.
- debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
.pc.
- debian/rules:
+ Don't run 'make test' when cross-building.
+ Use host compiler when cross-building. Patch from Neil Williams.
+ Don't build for processors no longer supported: i586 (on i386)
+ Fix Makefile to properly clean up libs/ dirs in clean target.
+ Replace duplicate files in the doc directory with symlinks.
- debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
- debian/rules: Enable optimized 64bit elliptic curve code contributed
by Google.
openssl (1.0.2g-1) unstable; urgency=high
* New upstream version
* Fix CVE-2016-0797
* Fix CVE-2016-0798
* Fix CVE-2016-0799
* Fix CVE-2016-0702
* Fix CVE-2016-0705
* Disable EXPORT and LOW ciphers: The DROWN attack (CVE-2016-0800)
makes use of those, and SLOTH attack (CVE-2015-7575) can make use of them
too.
-- Marc Deslauriers <email address hidden> Tue, 01 Mar 2016 14:09:30 -0500
-
openssl (1.0.2f-2ubuntu1) xenial; urgency=medium
* Merge with Debian, remaining changes.
- Disable SSLv3 without changing ABI:
+ debian/patches/no-sslv3.patch: Disable SSLv3 without using the
no-ssl3-method option
+ debian/rules: don't use no-ssl3-method, don't bump soname
+ debian/patches/engines-path.patch: don't bump soname
+ debian/patches/version-script.patch: don't bump soname
+ debian/patches/soname.patch: removed
+ debian/lib*: don't bump soname
- debian/control: don't enable rfc3779 and cms support for now as it
changes ABI.
- debian/libssl1.0.0.postinst:
+ Display a system restart required notification on libssl1.0.0
upgrade on servers.
+ Use a different priority for libssl1.0.0/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
in Debian).
- debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
rules}: Move runtime libraries to /lib, for the benefit of
wpasupplicant.
- debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
.pc.
- debian/rules:
+ Don't run 'make test' when cross-building.
+ Use host compiler when cross-building. Patch from Neil Williams.
+ Don't build for processors no longer supported: i586 (on i386)
+ Fix Makefile to properly clean up libs/ dirs in clean target.
+ Replace duplicate files in the doc directory with symlinks.
- debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
- debian/rules: Enable optimized 64bit elliptic curve code contributed
by Google.
* debian/patches/CVE-2016-0701.patch: dropped, upstream.
openssl (1.0.2f-2) unstable; urgency=high
* New upstream version.
- Fixes CVE-2016-0701
- Not affected by CVE-2015-3197 because SSLv2 is disabled.
-- Marc Deslauriers <email address hidden> Tue, 02 Feb 2016 13:37:21 -0500
-
openssl (1.0.2e-1ubuntu2) xenial; urgency=medium
* SECURITY UPDATE: DH small subgroups issue
- debian/patches/CVE-2016-0701.patch: add a test for small subgroup
attacks in crypto/dh/dhtest.c, always generate DH keys for ephemeral
DH cipher suites in doc/ssl/SSL_CTX_set_tmp_dh_callback.pod,
ssl/s3_lib.c, ssl/s3_srvr.c, ssl/ssl.h, prevent small subgroup
attacks on DH/DHE in crypto/dh/dh.h, crypto/dh/dh_check.c.
- CVE-2016-0701
-- Marc Deslauriers <email address hidden> Mon, 25 Jan 2016 13:39:46 -0500
-
openssl (1.0.2e-1ubuntu1) xenial; urgency=medium
* Merge with Debian, remaining changes.
- Disable SSLv3 without changing ABI:
+ debian/patches/no-sslv3.patch: Disable SSLv3 without using the
no-ssl3-method option
+ debian/rules: don't use no-ssl3-method, don't bump soname
+ debian/patches/engines-path.patch: don't bump soname
+ debian/patches/version-script.patch: don't bump soname
+ debian/patches/soname.patch: removed
+ debian/lib*: don't bump soname
- debian/control: don't enable rfc3779 and cms support for now as it
changes ABI.
- debian/libssl1.0.0.postinst:
+ Display a system restart required notification on libssl1.0.0
upgrade on servers.
+ Use a different priority for libssl1.0.0/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
in Debian).
- debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
rules}: Move runtime libraries to /lib, for the benefit of
wpasupplicant.
- debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
.pc.
- debian/rules:
+ Don't run 'make test' when cross-building.
+ Use host compiler when cross-building. Patch from Neil Williams.
+ Don't build for processors no longer supported: i586 (on i386)
+ Fix Makefile to properly clean up libs/ dirs in clean target.
+ Replace duplicate files in the doc directory with symlinks.
- debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
- debian/rules: Enable optimized 64bit elliptic curve code contributed
by Google.
openssl (1.0.2e-1) unstable; urgency=high
* New upstream release
- Fix CVE-2015-3193
- Fix CVE-2015-3194
- Fix CVE-2015-3195
- Fix CVE-2015-3196
* Remove all symlinks during clean
* Run make depend after configure
* Remove openssl_button.* from the doc package
openssl (1.0.2d-3) unstable; urgency=medium
* Upload to unstable
openssl (1.0.2d-2) experimental; urgency=medium
* Build with no-ssl3-method to remove all SSLv3 support. This results in
the functions SSLv3_method(), SSLv3_server_method() and
SSLv3_client_method() being removed from libssl. Change the soname as
result of that and also changes name of the binary package.
(Closes: #768476)
* Enable rfc3779 and cms support (Closes: #630790)
* Fix cross compilation for mips architectures. (Closes: #782492)
openssl (1.0.2d-1) unstable; urgency=high
* New upstream version
- Fixes CVE-2015-1793
-- Marc Deslauriers <email address hidden> Fri, 04 Dec 2015 08:24:39 -0500
-
openssl (1.0.2d-0ubuntu2) xenial; urgency=medium
* debian/patches/no-sslv3.patch: Disable SSLv3 without using the
no-ssl3-method option, as that changes ABI and we don't want to break
compatibility with third party applications and applications built for
older versions of Ubuntu, especially for an LTS release.
-- Marc Deslauriers <email address hidden> Mon, 09 Nov 2015 17:37:38 -0500
-
openssl (1.0.2d-0ubuntu1) wily; urgency=medium
* SECURITY UPDATE: alternative chains certificate forgery
- Updated to new upstream version
- CVE-2015-1793
-- Marc Deslauriers <email address hidden> Thu, 09 Jul 2015 09:27:48 -0400