libopenssl0_9_8-32bit - Secure Sockets and Transport Layer Security

Property Value
Distribution openSUSE Leap 42.3
Repository openSUSE Update Oss all
Package filename libopenssl0_9_8-32bit-0.9.8j-27.1.x86_64.rpm
Package name libopenssl0_9_8-32bit
Package version 0.9.8j
Package release 27.1
Package architecture x86_64
Package type rpm
Category Productivity/Networking/Security
License OpenSSL
Maintainer -
Download size 726.59 KB
Installed size 2.00 MB
The OpenSSL Project is a collaborative effort to develop a robust,
commercial-grade, full-featured, and open source toolkit implementing
the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS
v1) protocols with full-strength cryptography. The project is managed
by a worldwide community of volunteers that use the Internet to
communicate, plan, and develop the OpenSSL toolkit and its related
Derivation and License
OpenSSL is based on the excellent SSLeay library developed by Eric A.
Young and Tim J. Hudson. The OpenSSL toolkit is licensed under an
Apache-style license, which basically means that you are free to get it
and to use it for commercial and noncommercial purposes.
Please read the file /usr/share/doc/packages/openssl/README-FIPS.txt
for information on FIPS-140-2 compliant mode of operation of the
openssl shared libraries.


Package Version Architecture Repository
libopenssl0_9_8-32bit-0.9.8j-24.1.x86_64.rpm 0.9.8j x86_64 openSUSE Update Oss
libopenssl0_9_8-32bit-0.9.8j-21.2.x86_64.rpm 0.9.8j x86_64 openSUSE Update Oss
libopenssl0_9_8-32bit-0.9.8j-19.1.x86_64.rpm 0.9.8j x86_64 openSUSE Oss
libopenssl0_9_8-32bit - - -


Name Value - - - - -


Name Value - - - - - - - - -
libopenssl0_9_8-32bit = 0.9.8j-27.1
libopenssl0_9_8-32bit(x86-32) = 0.9.8j-27.1 - - -


Name Value
openssl-32bit <= 0.9.8j


Type URL
Binary Package libopenssl0_9_8-32bit-0.9.8j-27.1.x86_64.rpm
Source Package compat-openssl098-0.9.8j-27.1.src.rpm

Install Howto

Install libopenssl0_9_8-32bit rpm package:

# zypper install libopenssl0_9_8-32bit




2018-11-28 - Vít?zslav ?í?ek <>
- Add missing error string to CVE-2016-8610 fix (bsc#1110018#c9)
* modify openssl-CVE-2016-8610.patch
2018-11-14 - Vít?zslav ?í?ek <>
- Elliptic curve scalar multiplication timing attack defenses
* fixes "PortSmash" (bsc#1113534, CVE-2018-5407)
- Add openssl-CVE-2018-5407-PortSmash.patch
2018-11-05 - Vít?zslav ?í?ek <>
- OpenSSL Security Advisory [30 October 2018]
* Timing vulnerability in DSA signature generation
(bsc#1113652, CVE-2018-0734)
* And more timing fixes
- Add patches:
* openssl-CVE-2018-0734.patch
* 0001-Merge-to-1.0.2-DSA-mod-inverse-fix.patch
* 0001-Add-a-constant-time-flag-to-one-of-the-bignums-to-av.patch
* 0001-DSA-Address-a-timing-side-channel-whereby-it-is-possible.patch
* 0002-ECDSA-Address-a-timing-side-channel-whereby-it-is-possible.patch
2018-08-16 -
- Fix One&Done side-channel attack on RSA (bsc#1104789)
* add openssl-One_and_Done.patch
2018-08-13 -
- OpenSSL Security Advisory [12 June 2018]
* Reject excessively large primes in DH key generation
(bsc#1097158, CVE-2018-0732)
- add openssl-CVE-2018-0732.patch
* blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
- add 0001-Add-blinding-to-a-DSA-signature.patch and
2018-08-09 -
- OpenSSL Security Advisory [16 Apr 2018]
* Cache timing vulnerability in RSA Key Generation (CVE-2018-0737)
- add openssl-CVE-2018-0737.patch
2018-03-27 -
- OpenSSL Security Advisory [27 Mar 2018]
* Constructed ASN.1 types with a recursive definition could exceed
the stack (CVE-2018-0739) (bsc#1087102)
- add openssl-CVE-2018-0739.patch
2017-11-06 -
- Backport alternative chain lookup patches (bsc#1032261)
* openssl-1.0.1i-trusted-first.patch
* openssl-1.0.1i-alt-chains.patch
- fix crash in DES (bsc#1065363)
* add openssl-fix_crash_in_DES.patch
2017-04-18 -
- backport DEFAULT_SUSE cipher list (bsc#1034941)
* add openssl-add_DEFAULT_SUSE_cipher_list.patch
2017-01-31 -
- OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)
- ECSDA P-256 timing attack key recovery (bsc#1019334, CVE-2016-7056)
- remote denial of service in SSL alert handling
(bsc#1005878, CVE-2016-8610)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- fix crash in openssl speed (bsc#1000677)
- added patches:
* openssl-CVE-2016-7056.patch
* openssl-CVE-2016-8610.patch
* openssl-fix_crash_in_openssl_speed.patch
* openssl-degrade_3DES_to_MEDIUM_in_SSL2.patch
- add missing commit for CVE-2016-2108 (bsc#1004499)
* updated openssl-CVE-2016-2108.patch
- don't attempt session resumption if no ticket is present and session
ID length is zero (bsc#984663)
* add openssl-no_session_resumption_without_ticket.patch

See Also

Package Description
libopenssl1_0_0-1.0.2j-10.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-1.0.2j-13.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-1.0.2j-16.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-1.0.2j-19.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-1.0.2j-22.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-1.0.2j-25.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-1.0.2j-29.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-1.0.2j-32.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-1.0.2j-35.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-32bit-1.0.2j-10.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-32bit-1.0.2j-13.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-32bit-1.0.2j-16.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-32bit-1.0.2j-19.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-32bit-1.0.2j-22.1.x86_64.rpm Secure Sockets and Transport Layer Security
libopenssl1_0_0-32bit-1.0.2j-25.1.x86_64.rpm Secure Sockets and Transport Layer Security