Secure Sockets and Transport Layer Security

Edit Package openssl
http://www.openssl.org/

The OpenSSL Project is a collaborative effort to develop a robust,
commercial-grade, full-featured, and open source toolkit implementing
the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS
v1) protocols with full-strength cryptography. The project is managed
by a worldwide community of volunteers that use the Internet to
communicate, plan, and develop the OpenSSL toolkit and its related
documentation.

Derivation and License

OpenSSL is based on the excellent SSLeay library developed by Eric A.
Young and Tim J. Hudson. The OpenSSL toolkit is licensed under an
Apache-style license, which basically means that you are free to get it
and to use it for commercial and noncommercial purposes.

Refresh
Refresh
Source Files
Filename Size Changed
0005-libssl-Hide-library-private-symbols.patch 0000006897 6.74 KB
README.SuSE 0000000370 370 Bytes
VIA_padlock_support_on_64systems.patch 0000012246 12 KB
baselibs.conf 0000000171 171 Bytes
bug610223.patch 0000000431 431 Bytes
compression_methods_switch.patch 0000005881 5.74 KB
merge_from_0.9.8k.patch 0000002655 2.59 KB
openssl-1.0.0-c_rehash-compat.diff 0000001241 1.21 KB
openssl-1.0.1c-default-paths.patch 0000002698 2.63 KB
openssl-1.0.1e-truststore.diff 0000000625 625 Bytes
openssl-1.0.1n-default-paths.patch 0000009821 9.59 KB
openssl-1.0.1p.tar.gz 0004560208 4.35 MB
openssl-1.0.1p.tar.gz.asc 0000000473 473 Bytes
openssl-CVE-2015-0209.patch 0000001066 1.04 KB
openssl-CVE-2015-0286.patch 0000001059 1.03 KB
openssl-CVE-2015-0287.patch 0000003475 3.39 KB
openssl-CVE-2015-0288.patch 0000000824 824 Bytes
openssl-CVE-2015-0289.patch 0000006253 6.11 KB
openssl-CVE-2015-0293.patch 0000004684 4.57 KB
openssl-fix-pod-syntax.diff 0000007682 7.5 KB
openssl-ocloexec.patch 0000031373 30.6 KB
openssl-pkgconfig.patch 0000001358 1.33 KB
openssl.changes 0000069493 67.9 KB
openssl.spec 0000013939 13.6 KB
openssl.test 0000000063 63 Bytes
Latest Revision
Roman Drahtmueller's avatar Roman Drahtmueller (draht) committed (revision 1)
- update to 1.0.1p:
 * HMAC ABI incompatibility introduced into 1.0.1n was reverted (this
   was done with 1.0.1o).
- CVE-2015-1793: fix for CA flag certificate chain validatin logic error

- update to 1.0.1n:
 security update reference:
 https://openssl.org/news/secadv_20150611.txt (2015-06-11)
 Vulns are rated medium severity unless otherwise indicated here:
 * CVE-2015-4000 aka Logjam: TLS MITM DH keylength downgrade
 * CVE-2015-1788 Malformed ECParameters causes infinite loop
 * CVE-2015-1789 OOB read in X509_cmp_time via ASN1_TIME string
 * CVE-2015-1790 PKCS7 crash with missing EnvelopedContent
 * CVE-2015-1792 CMS verify infinite loop with unknown hash function
 * CVE-2015-1791 Race condition handling NewSessionTicket (low profile vuln.)
- re-diff'd:
  openssl-ocloexec.patch
  VIA_padlock_support_on_64systems.patch
  compression_methods_switch.patch
  0005-libssl-Hide-library-private-symbols.patch
- openssl-1.0.1c-default-paths.patch replaced by re-diff'd
  openssl-1.0.1n-default-paths.patch
- obsoleted: openssl-CVE-2015-0209.patch (NULL pointer checks
  were upstreamed differently in upstream versions after Feb 2015)
- obsoleted by identical upstream fixes: 
  openssl-CVE-2015-0286.patch
  openssl-CVE-2015-0287.patch
  openssl-CVE-2015-0288.patch
  openssl-CVE-2015-0289.patch
  openssl-CVE-2015-0293.patch
Comments 0
openSUSE Build Service is sponsored by