Jump to letter: [
4ABCDEFGHIJKLMNOPQRSTUVWXY
]
openssl-devel - Files for development of applications which will use OpenSSL.
- Description:
OpenSSL is a toolkit for supporting cryptography. The openssl-devel
package contains static libraries and include files needed to develop
applications which support various cryptographic algorithms and
protocols.
Packages
openssl-devel-0.9.7a-43.17.el4_8.6.i386
[1.6 MiB] |
Changelog
by Tomas Mraz (2010-12-07):
- CVE-2010-4180 - disable code for SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
(#659462)
- CVE-2009-3245 - fix missing checks on allocation failure in
bn_wexpand (#570924)
|
openssl-devel-0.9.7a-43.17.el4_8.5.i386
[1.6 MiB] |
Changelog
by Tomas Mraz (2010-02-18):
- do not disable SSLv2 in the renegotiation patch - SSLv2 does
not support renegotiation
- allow unsafe renegotiation on clients with SSL_OP_LEGACY_SERVER_CONNECT
|
openssl-devel-0.9.7a-43.17.el4_7.2.i386
[1.6 MiB] |
Changelog
by Tomas Mraz (2008-12-17):
- CVE-2008-5077 - incorrect checks for malformed signatures (#476671)
|
openssl-devel-0.9.7a-43.17.el4_6.1.i386
[1.6 MiB] |
Changelog
by Tomas Mraz (2007-10-22):
- CVE-2007-5135 off by one buffer overflow in SSL_get_shared_ciphers (#309851)
|
openssl-devel-0.9.7a-43.16.i386
[1.6 MiB] |
Changelog
by Tomas Mraz (2007-01-12):
- improves handling of certificates with EXFLAG_NSCERT set (#201005)
|
openssl-devel-0.9.7a-43.14.i386
[1.6 MiB] |
Changelog
by Tomas Mraz (2006-09-28):
- fix CVE-2006-2937 - mishandled error on ASN.1 parsing (#207276)
- fix CVE-2006-2940 - parasitic public keys DoS (#207274)
- fix CVE-2006-3738 - buffer overflow in SSL_get_shared_ciphers (#206940)
- fix CVE-2006-4343 - sslv2 client DoS (#206940)
|
openssl-devel-0.9.7a-43.11.i386
[1.6 MiB] |
Changelog
by Tomas Mraz (2006-09-09):
- fix CVE-2006-4339 - prevent attack on PKCS#1 v1.5 signatures (#205180)
- don't overwrite customized ca-bundle.pem on upgrade (#175811)
|
openssl-devel-0.9.7a-43.4.i386
[1.6 MiB] |
Changelog
by Tomas Mraz (2005-10-06):
- fix CAN-2005-2969 - remove SSL_OP_MSIE_SSLV2_RSA_PADDING which
disables the countermeasure against man in the middle attack in SSLv2
(#169863)
- more fixes for constant time/memory access for DSA signature algorithm
|