Linux repositories inspector

libssl1.0.2 - Secure Sockets Layer toolkit - shared libraries

This package is part of the OpenSSL project's implementation of the SSL and TLS cryptographic protocols for secure communication over the Internet.
It provides the libssl and libcrypto shared libraries.
1.0.2s
Debian iconDebian 9.0
1.0.2r
Debian iconDebian 9.0
DistributionVersionSincePackageInstalledPackager
Debian iconDebian 9.0 stretch/maindeb1.0.2r-1~deb9u1Jun 171.24 MiB3.47 MiB
Debian iconDebian 9.0 stretch-proposed-updates/maindeb1.0.2s-1~deb9u1Jul 051.24 MiB3.47 MiB

Latest updates

Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1.0.2s-1~deb9u1 reintroduced

0 - 16:58
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1.0.2s-1~deb9u1 removed

0 - 11:19
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1.0.2s-1~deb9u1 introduced

Jul 05
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1.0.2r-1~deb9u1 removed

Jun 17
Debian 9.0 icon

Debian 9.0 stretch/main: Updated from 1.0.2q-1~deb9u1 to 1.0.2r-1~deb9u1

Jun 17
Kurt Roeckx
  • New upstream version
    • Fixes CVE-2019-1559
    Sebastian Andrzej Siewior
    • Use openssl.cnf from the build directory for the testsuite.
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1.0.2r-1~deb9u1 introduced

Mar 10
Kurt Roeckx
  • New upstream version
    • Fixes CVE-2019-1559
    Sebastian Andrzej Siewior
    • Use openssl.cnf from the build directory for the testsuite.
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1.0.2q-1~deb9u1 removed

Feb 16
Debian 9.0 icon

Debian 9.0 stretch/main: Updated from 1.0.2l-2+deb9u3 to 1.0.2q-1~deb9u1

Feb 16
  • use signing-key.asc and a https links for downloads
  • Import 1.0.2q stable release.
    • CVE-2018-0737 (Cache timing vulnerability in RSA Key Generation)
    • CVE-2018-0732 (Client DoS due to large DH parameter)
    • CVE-2018-0734 (Timing vulnerability in DSA signature generation)
    • CVE-2018-5407 (Microarchitecture timing vulnerability in ECC scalar multiplication)
Debian 10.0 icon

Debian 10.0 buster/main: Version 1.0.2n-1 removed

Jan 12
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Updated from 1.0.2l-2+deb9u3 to 1.0.2q-1~deb9u1

Jan 12
  • use signing-key.asc and a https links for downloads
  • Import 1.0.2q stable release.
    • CVE-2018-0737 (Cache timing vulnerability in RSA Key Generation)
    • CVE-2018-0732 (Client DoS due to large DH parameter)
    • CVE-2018-0734 (Timing vulnerability in DSA signature generation)
    • CVE-2018-5407 (Microarchitecture timing vulnerability in ECC scalar multiplication)
Debian 9.0 icon

Debian 9.0 stretch/main: Updated from 1.0.2l-2+deb9u2 to 1.0.2l-2+deb9u3

Jan 12
  • CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could exceed the stack)
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1.0.2l-2+deb9u3 introduced

2018-06-19
  • CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could exceed the stack)
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1.0.2l-2+deb9u2 removed

2018-03-14
Debian 9.0 icon

Debian 9.0 stretch/main: Updated from 1.0.2l-2+deb9u1 to 1.0.2l-2+deb9u2

2018-03-14
  • CVE-2017-3737 (Read/write after SSL object in error state)
  • Add a testcase for CVE-2017-3737
  • CVE-2017-3738 (rsaz_1024_mul_avx2 overflow bug on x86_64)
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1.0.2l-2+deb9u2 introduced

2017-12-24
  • CVE-2017-3737 (Read/write after SSL object in error state)
  • Add a testcase for CVE-2017-3737
  • CVE-2017-3738 (rsaz_1024_mul_avx2 overflow bug on x86_64)
Debian 10.0 icon

Debian 10.0 buster/main: Updated from 1.0.2m-3 to 1.0.2n-1

2017-12-18
  • New upstream version 1.0.2n
    • drop patches which applied upstream:
      • 0001-Fix-no-ssl3-build.patch
      • 0001-aes-armv4-bsaes-armv7-sha256-armv4-.pl-make-it-work-.patch
    • Fixes CVE-2017-3737 (Read/write after SSL object in error state)
    • Fixes CVE-2017-3738 (rsaz_1024_mul_avx2 overflow bug on x86_64)
  • move to gbp
  • Abort the build if symbols are discovered which are not part of the symbols file.
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1.0.2l-2+deb9u1 removed

2017-12-09
Debian 9.0 icon

Debian 9.0 stretch/main: Updated from 1.0.2l-2 to 1.0.2l-2+deb9u1

2017-12-09
  • Fix CVE-2017-3735
  • Fix CVE-2017-3736
Debian 9.0 icon

Debian 9.0 stretch-proposed-updates/main: Version 1.0.2l-2+deb9u1 introduced

2017-11-12
  • Fix CVE-2017-3735
  • Fix CVE-2017-3736
Debian 10.0 icon

Debian 10.0 buster/main: Version 1.0.2m-3 introduced

2017-11-10
  • Avoid problems with aes and sha256 assembler on armhf using binutils 2.29
⇧ Top