Format: 1.8 Date: Tue, 21 Apr 2020 16:29:23 +0200 Source: openssl Architecture: source Version: 1.1.1g-1+ubuntu16.04.1+deb.sury.org+1 Distribution: xenial Urgency: high Maintainer: Debian OpenSSL Team Changed-By: Ondřej Surý Closes: 759811 767207 773601 794326 802591 813191 816239 823774 827028 839575 843064 844234 844715 848957 852017 852900 852920 859191 860254 861145 863367 863707 864080 867240 869856 875423 878303 882007 888305 891570 891797 892276 894282 895844 907631 910459 911389 912067 913558 923516 926315 941765 941987 947949 955442 Changes: openssl (1.1.1g-1+ubuntu16.04.1+deb.sury.org+1) xenial; urgency=medium . * No-change backport to xenial . openssl (1.1.1g-1) unstable; urgency=medium . * New upstream version . openssl (1.1.1f-1) unstable; urgency=medium . * New upstream version - Revert the change of EOF detection to avoid regressions in applications. (Closes: #955442). . openssl (1.1.1e-1) unstable; urgency=medium . * Use dh-compat level 12. * New upstream version - CVE-2019-1551 (Overflow in the x64_64 Montgomery squaring procedure), (Closes: #947949). * Update symbol list. * Update Standards-Version to 4.5.0. No changes required. * Add musl configurations (Closes: #941765). . openssl (1.1.1d-2) unstable; urgency=medium . * Reenable AES-CBC-HMAC-SHA ciphers (Closes: #941987). . openssl (1.1.1d-1) unstable; urgency=medium . * New upstream version - CVE-2019-1549 (Fixed a fork protection issue). - CVE-2019-1547 (Compute ECC cofactors if not provided during EC_GROUP construction). - CVE-2019-1563 (Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey). * Update symbol list . openssl (1.1.1c-1) unstable; urgency=medium . * New upstream version - CVE-2019-1543 (Prevent over long nonces in ChaCha20-Poly1305) * Update symbol list . openssl (1.1.1b-2) unstable; urgency=medium . * Fix BUF_MEM regression (Closes: #923516) * Fix error when config can't be opened (Closes: #926315) * Ship an openssl.cnf in libssl1.1-udeb.dirs . openssl (1.1.1b-1) unstable; urgency=medium . [ Sebastian Andrzej Siewior ] * Add Breaks on lighttpd (Closes: #913558). . [ Kurt Roeckx ] * New upstream version * Update symbol list . openssl (1.1.1a-1) unstable; urgency=medium . * Add Breaks on python-boto (See: #909545) * New upstream version - CVE-2018-0734 (Timing vulnerability in DSA signature generation) - CVE-2018-0735 (Timing vulnerability in ECDSA signature generation) - Update symbol file for 1.1.1a . openssl (1.1.1-2) unstable; urgency=medium . [ Sebastian Andrzej Siewior ] * Add Breaks on isync (See: #906955) * Fix autopkgtest (Closes: #910459) . [ Kurt Roeckx ] * Add Breaks on python-imaplib2 (See: #907079) * Add news entry regarding default TLS version and security level (Closes: #875423, #907631, #911389, #912067). . openssl (1.1.1-1) unstable; urgency=medium . * New upstream version. - Update symbol file for 1.1.1 - CVE-2018-0732 (actually since pre8). * Add Breaks on python-httplib2 (See: #907278) * Add hardening=+all. * Update to policy 4.2.1 - Less verbose testsuite with terse - Use RRR=no . openssl (1.1.1~~pre9-1) unstable; urgency=medium . * New upstream version. - Support the final TLS 1.3 version (RFC 8446) * Upload to unstable . openssl (1.1.1~~pre8-1) experimental; urgency=medium . * New upstream version. . openssl (1.1.1~~pre7-1) experimental; urgency=medium . * Drop afalgeng on kfreebsd-* which go enabled because they inherit from the linux target. * Fix debian-rules-sets-dpkg-architecture-variable. * Update to policy 4.1.4 - only Suggest: libssl-doc instead Recommends (only documentation and example code is shipped). - drop Priority: important. - use signing-key.asc and a https links for downloads * Use compat 11. - this moves the examples to /usr/share/doc/libssl-{doc->dev}/demos but it seems to make sense. * Add a 25-test_verify.t for autopkgtest which runs against intalled openssl binary. * Fix CVE-2018-0737 (Closes: #895844). . openssl (1.1.1~~pre6-2) experimental; urgency=medium . * Update libssl1.1.symbols . openssl (1.1.1~~pre6-1) experimental; urgency=medium . * New upstream version * Increase default security level from 1 to 2. This moves from the 80 bit security level to the 112 bit securit level and will require 2048 bit RSA and DHE keys. . openssl (1.1.1~~pre4-1) experimental; urgency=medium . * Update to 1.1.1-pre4 (Closes: #892276, #894282). * Add riscv64 target (Closes: #891797). . openssl (1.1.1~~pre3-1) experimental; urgency=medium . * Update to 1.1.1-pre3 * Don't suggest 1024 bit RSA key to be typical (Closes: #878303). * Don't insist on TLS1.3 cipher for * Add a udeb for libssl, based on similar changes done in Ubuntu starting in version 0.9.8o-4ubuntu1 (Closes: #802591) Patch from Margarita Manterola * Add support for nios2 (Closes: #816239) Based on patch from Marek Vasut * Update Spanish translation from Manuel "Venturi" Porras Peralta (Closes: #773601) * Don't build an i586 optimized version anymore, the default already targets that. Patch from Sven Joachim (Closes: #759811) Checksums-Sha1: 04a71db836509bc33a0e69268174ad6897882140 2612 openssl_1.1.1g-1+ubuntu16.04.1+deb.sury.org+1.dsc 9f555c03ccc333e7ab8e9e295a37e4ef9e5cfeee 9975389 openssl_1.1.1g.orig.tar.gz bd1c30c8b955a332008e7ab5f22e4596f4d22ab8 83984 openssl_1.1.1g-1+ubuntu16.04.1+deb.sury.org+1.debian.tar.xz 0a5260c1712df3ff1a592d7b98a52f9250286fec 7900 openssl_1.1.1g-1+ubuntu16.04.1+deb.sury.org+1_source.buildinfo Checksums-Sha256: bd37d2ef0dadd866b53d194bfbdced26cf150e0ce5bc6c8001d2940af15814dd 2612 openssl_1.1.1g-1+ubuntu16.04.1+deb.sury.org+1.dsc 6e2ab033c80acf353f804c85d554c4fe40cf6941a04b1a8185c30b95caf86396 9975389 openssl_1.1.1g.orig.tar.gz f642f8baca0c37cd4497dd1f45b83e400347533149b7a3cfa717f3b03a395bd2 83984 openssl_1.1.1g-1+ubuntu16.04.1+deb.sury.org+1.debian.tar.xz d34cafe202170cbccc92636826e364f8fab5cd2e2a7676e65c1e8daa9073a4bb 7900 openssl_1.1.1g-1+ubuntu16.04.1+deb.sury.org+1_source.buildinfo Files: c4d89d9061b9f041af8d501bd6b79c96 2612 utils optional openssl_1.1.1g-1+ubuntu16.04.1+deb.sury.org+1.dsc a4274921111cf75657b23357d7b8e3b5 9975389 utils optional openssl_1.1.1g.orig.tar.gz 66f44eaedfcd6b550eb84704bb3299f1 83984 utils optional openssl_1.1.1g-1+ubuntu16.04.1+deb.sury.org+1.debian.tar.xz ee98b332e313bd19120beb037a5e24e3 7900 utils optional openssl_1.1.1g-1+ubuntu16.04.1+deb.sury.org+1_source.buildinfo