| Name: | openssl-devel |
|---|---|
| Epoch: | 1 |
| Version: | 1.1.1k |
| Release: | 7.el8_6 |
| Architecture: | i686 |
| Group: | Unspecified |
| Size: | 3549022 |
| License: | OpenSSL and ASL 2.0 |
| RPM: | openssl-devel-1.1.1k-7.el8_6.i686.rpm |
| Source RPM: | openssl-1.1.1k-7.el8_6.src.rpm |
| Build Date: | Tue Aug 02 2022 |
| Build Host: | build-ol8-i386.oracle.com |
| Vendor: | Oracle America |
| URL: | http://www.openssl.org/ |
| Summary: | Files for development of applications which will use OpenSSL |
| Description: | OpenSSL is a toolkit for supporting cryptography. The openssl-devel package contains include files needed to develop applications which support various cryptographic algorithms and protocols. |
- Fix CVE-2022-2097: AES OCB fails to encrypt some bytes on 32-bit x86 Resolves: CVE-2022-2097 - Update expired certificates used in the testsuite Resolves: rhbz#2100554 - Fix CVE-2022-1292: openssl: c_rehash script allows command injection Resolves: rhbz#2090371 - Fix CVE-2022-2068: the c_rehash script allows command injection Resolves: rhbz#2098278
- Fixes CVE-2022-0778 openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates - Resolves: rhbz#2067145
- Fixes CVE-2021-3712 openssl: Read buffer overruns processing ASN.1 strings - Resolves: rhbz#2005402
- Fixes bugs in s390x AES code. - Uses the first detected address family if IPv6 is not available - Reverts the changes in https://github.com/openssl/openssl/pull/13305 as it introduces a regression if server has a DSA key pair, the handshake fails when the protocol is not explicitly set to TLS 1.2. However, if the patch is reverted, it has an effect on the "ssl_reject_handshake" feature in nginx. Although, this feature will continue to work, TLS 1.3 protocol becomes unavailable/disabled. This is already known - https://trac.nginx.org/nginx/ticket/2071#comment:1 As per https://github.com/openssl/openssl/issues/16075#issuecomment-879939938, nginx could early callback instead of servername callback. - Resolves: rhbz#1978214 - Related: rhbz#1934534
- Cleansup the peer point formats on renegotiation - Resolves rhbz#1965362
- Fixes FIPS_selftest to work in FIPS mode. Resolves: rhbz#1940085 - Using safe primes for FIPS DH self-test
- Update to version 1.1.1k
- Use AI_ADDRCONFIG only when explicit host name is given - Allow only curves defined in RFC 8446 in TLS 1.3
- Remove 2-key 3DES test from FIPS_selftest
- Fix CVE-2021-3450 openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT - Fix CVE-2021-3449 NULL pointer deref in signature_algorithms processing