Пакет openssl-devel-1:1.1.1k-14.el8_10.i686
| Имя | openssl-devel |
|---|---|
| Эпоха | 1 |
| Версия | 1.1.1k |
| Релиз | 14.el8_10 |
| Архитектура | i686 |
| Сайт | http://www.openssl.org/ |
| Лицензия | OpenSSL and ASL 2.0 |
| Время сборки | 2026-01-09 09:10:54 |
| Хост сборки | builder-x86-06.inferitos.ru |
| Краткое описание | Files for development of applications which will use OpenSSL |
| Репозитории | BaseOS |
| Полное описание | OpenSSL is a toolkit for supporting cryptography. The openssl-devel package contains include files needed to develop applications which support various cryptographic algorithms and protocols. |
| Эррата | — |
| Размер | 2382 КиБ |
| Исходный проект | openssl-1.1.1k-14.el8_10 |
| Контрольная сумма SHA-256 | 86036d5ecf51c782f5d6f48c2b617743274084b75ebd010f10d0d2deca26dcec |
×
* Mon Dec 08 2025 Nikita Sanjay Patwa <npatwa@redhat.com> - 1:1.1.1k-14 - Backport fix for Out-of-bounds read & write in RFC 3211 KEK Unwrap Fix CVE-2025-9230 Resolves: RHEL-128613 - Fix bug for ticket_lifetime_hint exceed issue Resolves: RHEL-119891 * Mon Sep 16 2024 Maurizio Barbaro <mbarbaro@redhat.com> - 1:1.1.1k-13 - Backport fix SSL_select_next proto from OpenSSL 3.2 Fix CVE-2024-5535 Resolves: RHEL-45654 * Thu Nov 30 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:1.1.1k-12 - Backport implicit rejection mechanism for RSA PKCS#1 v1.5 to RHEL-8 series (a proper fix for CVE-2020-25659) Resolves: RHEL-17696 * Wed Nov 15 2023 Clemens Lang <cllang@redhat.com> - 1:1.1.1k-11 - Fix CVE-2023-5678: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow Resolves: RHEL-16538 * Thu Oct 19 2023 Clemens Lang <cllang@redhat.com> - 1:1.1.1k-10 - Fix CVE-2023-3446: Excessive time spent checking DH keys and parameters Resolves: RHEL-14245 - Fix CVE-2023-3817: Excessive time spent checking DH q parameter value Resolves: RHEL-14239 * Wed Jul 26 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 1:1.1.1k-9 - Rebuilt for MSVSphere 8.8 * Wed Feb 08 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:1.1.1k-9 - Fixed Timing Oracle in RSA Decryption Resolves: CVE-2022-4304 - Fixed Double free after calling PEM_read_bio_ex Resolves: CVE-2022-4450 - Fixed Use-after-free following BIO_new_NDEF Resolves: CVE-2023-0215 - Fixed X.400 address type confusion in X.509 GeneralName Resolves: CVE-2023-0286 * Thu Jul 21 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:1.1.1k-8 - Fix no-ec build Resolves: rhbz#2071020 * Tue Jul 05 2022 Clemens Lang <cllang@redhat.com> - 1:1.1.1k-7 - Fix CVE-2022-2097: AES OCB fails to encrypt some bytes on 32-bit x86 Resolves: CVE-2022-2097 - Update expired certificates used in the testsuite Resolves: rhbz#2092462 - Fix CVE-2022-1292: openssl: c_rehash script allows command injection Resolves: rhbz#2090372 - Fix CVE-2022-2068: the c_rehash script allows command injection Resolves: rhbz#2098279 * Wed Mar 23 2022 Clemens Lang <cllang@redhat.com> - 1:1.1.1k-6 - Fixes CVE-2022-0778 openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates - Resolves: rhbz#2067146