1
openssl (0.9.8k-7ubuntu1) lucid; urgency=low
3
* Merge from debian unstable, remaining changes (LP: #493392):
4
- Link using -Bsymbolic-functions
6
- Disable SSLv2 during compile
7
- Ship documentation in openssl-doc, suggested by the package.
8
- Use a different priority for libssl0.9.8/restart-services
9
depending on whether a desktop, or server dist-upgrade is being
11
- Display a system restart required notification bubble on libssl0.9.8
13
- Replace duplicate files in the doc directory with symlinks.
14
- Move runtime libraries to /lib, for the benefit of wpasupplicant
15
* Strip the patches out of the source into quilt patches
16
* Disable CVE-2009-3555.patch
18
-- Nicolas Valcárcel Scerpella (Canonical) <nvalcarcel@canonical.com> Sun, 06 Dec 2009 20:16:24 -0500
20
openssl (0.9.8k-7) unstable; urgency=low
22
* Bump the shlibs to require 0.9.8k-1. The following symbols
23
to added between g and k: AES_wrap_key, AES_unwrap_key,
24
ASN1_TYPE_set1, ASN1_STRING_set0, asn1_output_data_fn,
25
SMIME_read_ASN1, BN_X931_generate_Xpq, BN_X931_derive_prime_ex,
26
BN_X931_generate_prime_ex, COMP_zlib_cleanup, CRYPTO_malloc_debug_init,
27
int_CRYPTO_set_do_dynlock_callback, CRYPTO_set_mem_info_functions,
28
CRYPTO_strdup, CRYPTO_dbg_push_info, CRYPTO_dbg_pop_info,
29
CRYPTO_dbg_remove_all_info, OPENSSL_isservice, OPENSSL_init,
30
ENGINE_set_load_ssl_client_cert_function,
31
ENGINE_get_ssl_client_cert_function, ENGINE_load_ssl_client_cert,
32
EVP_CIPHER_CTX_set_flags, EVP_CIPHER_CTX_clear_flags,
33
EVP_CIPHER_CTX_test_flags, HMAC_CTX_set_flags, OCSP_sendreq_new
34
OCSP_sendreq_nbio, OCSP_REQ_CTX_free, RSA_X931_derive_ex,
35
RSA_X931_generate_key_ex, X509_ALGOR_set0, X509_ALGOR_get0,
36
X509at_get0_data_by_OBJ, X509_get1_ocsp
38
-- Kurt Roeckx <kurt@roeckx.be> Sat, 28 Nov 2009 14:34:26 +0100
40
openssl (0.9.8k-6) unstable; urgency=low
42
* Disable SSL/TLS renegotiation (CVE-2009-3555) (Closes: #555829)
44
-- Kurt Roeckx <kurt@roeckx.be> Thu, 12 Nov 2009 18:10:31 +0000
46
openssl (0.9.8k-5) unstable; urgency=low
48
* Don't check self signed certificate signatures in X509_verify_cert()
51
-- Kurt Roeckx <kurt@roeckx.be> Fri, 11 Sep 2009 15:42:32 +0200
53
openssl (0.9.8k-4) unstable; urgency=low
55
* Split all the patches into a separate files
56
* Stop undefinging HZ, the issue on alpha should be fixed.
57
* Remove MD2 from digest algorithm table. (CVE-2009-2409) (Closes: #539899)
59
-- Kurt Roeckx <kurt@roeckx.be> Tue, 11 Aug 2009 21:19:18 +0200
61
openssl (0.9.8k-3) unstable; urgency=low
63
* Make rc4-x86_64 PIC. Based on patch from Petr Salinger (Closes: #532336)
64
* Add workaround for kfreebsd that can't see the different between
65
two pipes. Patch from Petr Salinger.
67
-- Kurt Roeckx <kurt@roeckx.be> Sat, 13 Jun 2009 18:15:46 +0200
69
openssl (0.9.8k-2) unstable; urgency=low
71
* Move libssl0.9.8-dbg to the debug section.
72
* Use the rc4 assembler on kfreebsd-amd64 (Closes: #532336)
73
* Split the line to generate md5-x86_64.s in the Makefile. This will
74
hopefully fix the build issue on kfreebsd that now outputs the file
75
to stdout instead of the file.
76
* Fix denial of service via an out-of-sequence DTLS handshake message
77
(CVE-2009-1387) (Closes: #532037)
79
-- Kurt Roeckx <kurt@roeckx.be> Mon, 08 Jun 2009 19:05:56 +0200
81
openssl (0.9.8k-1) unstable; urgency=low
83
* New upstream release
84
- 0.9.8i fixed denial of service via a DTLS ChangeCipherSpec packet
85
that occurs before ClientHello (CVE-2009-1386)
86
* Make aes-x86_64.pl use PIC.
87
* Fix security issues (Closes: #530400)
88
- "DTLS record buffer limitation bug." (CVE-2009-1377)
89
- "DTLS fragment handling" (CVE-2009-1378)
90
- "DTLS use after free" (CVE-2009-1379)
91
* Fixed Configure for hurd: use -mtune=i486 instead of -m486
92
Patch by Marc Dequènes (Duck) <duck@hurdfr.org> (Closes: #530459)
93
* Add support for avr32 (Closes: #528648)
95
-- Kurt Roeckx <kurt@roeckx.be> Sat, 16 May 2009 17:33:55 +0200
1
97
openssl (0.9.8g-16ubuntu3) karmic; urgency=low
3
99
* SECURITY UPDATE: certificate spoofing via hash collisions from MD2