libopenssl0_9_8-32bit-0.9.8j-24.1.x86_64.rpm


Advertisement

Description

libopenssl0_9_8-32bit - Secure Sockets and Transport Layer Security

Property Value
Distribution openSUSE Leap 42.3
Repository openSUSE Update Oss all
Package filename libopenssl0_9_8-32bit-0.9.8j-24.1.x86_64.rpm
Package name libopenssl0_9_8-32bit
Package version 0.9.8j
Package release 24.1
Package architecture x86_64
Package type rpm
Category Productivity/Networking/Security
Homepage http://www.openssl.org/
License OpenSSL
Maintainer -
Download size 724.08 KB
Installed size 2.00 MB
The OpenSSL Project is a collaborative effort to develop a robust,
commercial-grade, full-featured, and open source toolkit implementing
the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS
v1) protocols with full-strength cryptography. The project is managed
by a worldwide community of volunteers that use the Internet to
communicate, plan, and develop the OpenSSL toolkit and its related
documentation.
Derivation and License
OpenSSL is based on the excellent SSLeay library developed by Eric A.
Young and Tim J. Hudson. The OpenSSL toolkit is licensed under an
Apache-style license, which basically means that you are free to get it
and to use it for commercial and noncommercial purposes.
Please read the file /usr/share/doc/packages/openssl/README-FIPS.txt
for information on FIPS-140-2 compliant mode of operation of the
openssl shared libraries.

Alternatives

Package Version Architecture Repository
libopenssl0_9_8-32bit-0.9.8j-27.1.x86_64.rpm 0.9.8j x86_64 openSUSE Update Oss
libopenssl0_9_8-32bit-0.9.8j-21.2.x86_64.rpm 0.9.8j x86_64 openSUSE Update Oss
libopenssl0_9_8-32bit-0.9.8j-19.1.x86_64.rpm 0.9.8j x86_64 openSUSE Oss
libopenssl0_9_8-32bit - - -

Requires

Name Value
libc.so.6(GLIBC_2.7) -
libdl.so.2 -
libdl.so.2(GLIBC_2.0) -
libdl.so.2(GLIBC_2.1) -
libz.so.1 -

Provides

Name Value
lib4758cca.so -
libaep.so -
libatalla.so -
libcapi.so -
libchil.so -
libcrypto.so.0.9.8 -
libcswift.so -
libgmp.so -
libnuron.so -
libopenssl0_9_8-32bit = 0.9.8j-24.1
libopenssl0_9_8-32bit(x86-32) = 0.9.8j-24.1
libssl.so.0.9.8 -
libsureware.so -
libubsec.so -

Obsoletes

Name Value
openssl-32bit <= 0.9.8j

Download

Type URL
Mirror widehat.opensuse.org
Binary Package libopenssl0_9_8-32bit-0.9.8j-24.1.x86_64.rpm
Source Package compat-openssl098-0.9.8j-24.1.src.rpm

Install Howto

Install libopenssl0_9_8-32bit rpm package:

# zypper install libopenssl0_9_8-32bit

Files

Path
/usr/lib/.libcrypto.so.0.9.8.hmac
/usr/lib/.libssl.so.0.9.8.hmac
/usr/lib/libcrypto.so.0.9.8
/usr/lib/libssl.so.0.9.8
/usr/lib/engines098/lib4758cca.so
/usr/lib/engines098/libaep.so
/usr/lib/engines098/libatalla.so
/usr/lib/engines098/libcapi.so
/usr/lib/engines098/libchil.so
/usr/lib/engines098/libcswift.so
/usr/lib/engines098/libgmp.so
/usr/lib/engines098/libnuron.so
/usr/lib/engines098/libsureware.so
/usr/lib/engines098/libubsec.so

Changelog

2018-08-13 - vcizek@suse.com
- OpenSSL Security Advisory [12 June 2018]
* Reject excessively large primes in DH key generation
(bsc#1097158, CVE-2018-0732)
- add openssl-CVE-2018-0732.patch
* blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
- add openssl-add-blinding-to-ecdsa.patch and
openssl-add-blinding-to-dsa.patch
2018-08-09 - vcizek@suse.com
- OpenSSL Security Advisory [16 Apr 2018]
* Cache timing vulnerability in RSA Key Generation (CVE-2018-0737)
(bsc#1089039)
- add openssl-CVE-2018-0737.patch
2018-03-27 - vcizek@suse.com
- OpenSSL Security Advisory [27 Mar 2018]
* Constructed ASN.1 types with a recursive definition could exceed
the stack (CVE-2018-0739) (bsc#1087102)
- add openssl-CVE-2018-0739.patch
2017-11-06 - vcizek@suse.com
- Backport alternative chain lookup patches (bsc#1032261)
* openssl-1.0.1i-trusted-first.patch
* openssl-1.0.1i-alt-chains.patch
- fix crash in DES (bsc#1065363)
* add openssl-fix_crash_in_DES.patch
2017-04-18 - vcizek@suse.com
- backport DEFAULT_SUSE cipher list (bsc#1034941)
* add openssl-add_DEFAULT_SUSE_cipher_list.patch
2017-01-31 - vcizek@suse.com
- OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)
- ECSDA P-256 timing attack key recovery (bsc#1019334, CVE-2016-7056)
- remote denial of service in SSL alert handling
(bsc#1005878, CVE-2016-8610)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- fix crash in openssl speed (bsc#1000677)
- added patches:
* openssl-CVE-2016-7056.patch
* openssl-CVE-2016-8610.patch
* openssl-fix_crash_in_openssl_speed.patch
* openssl-degrade_3DES_to_MEDIUM_in_SSL2.patch
- add missing commit for CVE-2016-2108 (bsc#1004499)
* updated openssl-CVE-2016-2108.patch
- don't attempt session resumption if no ticket is present and session
ID length is zero (bsc#984663)
* add openssl-no_session_resumption_without_ticket.patch
2016-09-23 - vcizek@suse.com
- resume reading from /dev/urandom when interrupted by a signal
(bsc#995075)
* add openssl-randfile_fread_interrupt.patch
2016-09-22 - vcizek@suse.com
- OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)
Severity: High
* OCSP Status Request extension unbounded memory growth
(CVE-2016-6304) (bsc#999666)
Severity: Low
* Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
* Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249)
* DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
* DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
* OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
* Birthday attack against 64-bit block ciphers (SWEET32)
(CVE-2016-2183) (bsc#995359)
* Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
* OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
* Certificate message OOB reads (CVE-2016-6306) (bsc#999668)
- added patches:
* openssl-CVE-2016-2177.patch
* openssl-CVE-2016-2178.patch
* openssl-CVE-2016-2179.patch
* openssl-CVE-2016-2181.patch
* openssl-CVE-2016-2182.patch
* openssl-CVE-2016-2183-SWEET32.patch
* openssl-CVE-2016-6302.patch
* openssl-CVE-2016-6303.patch
* openssl-CVE-2016-6304.patch
* openssl-CVE-2016-6306.patch
* 0001-PR-2506.patch
2016-09-22 - vcizek@suse.com
- update expired S/MIME certs (bsc#979475)
* add openssl-update-expired-smime-certs.patch
- fix crash in print_notice (bsc#998190)
* add openssl-print_notice-NULL_crash.patch

See Also

Package Description
libopenssl1_0_0-1.0.2j-10.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-1.0.2j-13.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-1.0.2j-16.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-1.0.2j-19.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-1.0.2j-22.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-1.0.2j-25.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-1.0.2j-29.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-1.0.2j-32.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-1.0.2j-35.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-32bit-1.0.2j-10.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-32bit-1.0.2j-13.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-32bit-1.0.2j-16.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-32bit-1.0.2j-19.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-32bit-1.0.2j-22.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-32bit-1.0.2j-25.1.x86_64.rpm Secure Sockets and Transport Layer Security
Advertisement
Advertisement