openssl_1.0.1e-2+deb7u20_amd64.deb


Advertisement

Description

openssl - Secure Socket Layer (SSL) binary and related cryptographic tools

Distribution: Debian 7 (Wheezy)
Repository: Debian Main amd64
Package name: openssl
Package version: 1.0.1e
Package release: 2+deb7u20
Package architecture: amd64
Package type: deb
Installed size: 1.06 KB
Download size: 685.21 KB
Official Mirror: ftp.br.debian.org
This package contains the openssl binary and related tools. It is part of the OpenSSL implementation of SSL. You need it to perform certain cryptographic actions like: - Creation of RSA, DH and DSA key parameters; - Creation of X.509 certificates, CSRs and CRLs; - Calculation of message digests; - Encryption and decryption with ciphers; - SSL/TLS client and server tests; - Handling of S/MIME signed or encrypted mail.

Alternatives

    Download

    Source package: openssl

    Install Howto

    1. Update the package index:
      # sudo apt-get update
    2. Install openssl deb package:
      # sudo apt-get install openssl

    Files

    • /etc/ssl/openssl.cnf
    • /usr/bin/c_rehash
    • /usr/bin/openssl
    • /usr/lib/ssl/certs
    • /usr/lib/ssl/openssl.cnf
    • /usr/lib/ssl/private
    • /usr/lib/ssl/misc/CA.pl
    • /usr/lib/ssl/misc/CA.sh
    • /usr/lib/ssl/misc/c_hash
    • /usr/lib/ssl/misc/c_info
    • /usr/lib/ssl/misc/c_issuer
    • /usr/lib/ssl/misc/c_name
    • /usr/lib/ssl/misc/tsget
    • /usr/share/doc/openssl/CHANGES.SSLeay.gz
    • /usr/share/doc/openssl/FAQ.gz
    • /usr/share/doc/openssl/NEWS.gz
    • /usr/share/doc/openssl/README.Debian
    • /usr/share/doc/openssl/README.gz
    • /usr/share/doc/openssl/README.optimization
    • /usr/share/doc/openssl/changelog.Debian.gz
    • /usr/share/doc/openssl/changelog.gz
    • /usr/share/doc/openssl/copyright
    • /usr/share/doc/openssl/fingerprints.txt
    • /usr/share/doc/openssl/openssl.txt.gz
    • /usr/share/doc/openssl/openssl_button.gif
    • /usr/share/doc/openssl/openssl_button.html
    • /usr/share/doc/openssl/standards.txt.gz
    • /usr/share/doc/openssl/HOWTO/certificates.txt.gz
    • /usr/share/doc/openssl/HOWTO/keys.txt
    • /usr/share/doc/openssl/HOWTO/proxy_certificates.txt.gz
    • /usr/share/man/man1/CA.pl.1ssl.gz
    • /usr/share/man/man1/asn1parse.1ssl.gz
    • /usr/share/man/man1/c_rehash.1ssl.gz
    • /usr/share/man/man1/ca.1ssl.gz
    • /usr/share/man/man1/ciphers.1ssl.gz
    • /usr/share/man/man1/cms.1ssl.gz
    • /usr/share/man/man1/crl.1ssl.gz
    • /usr/share/man/man1/crl2pkcs7.1ssl.gz
    • /usr/share/man/man1/dgst.1ssl.gz
    • /usr/share/man/man1/dhparam.1ssl.gz
    • /usr/share/man/man1/dsa.1ssl.gz
    • /usr/share/man/man1/dsaparam.1ssl.gz
    • /usr/share/man/man1/ec.1ssl.gz
    • /usr/share/man/man1/ecparam.1ssl.gz
    • /usr/share/man/man1/enc.1ssl.gz
    • /usr/share/man/man1/errstr.1ssl.gz
    • /usr/share/man/man1/gendsa.1ssl.gz
    • /usr/share/man/man1/genpkey.1ssl.gz
    • /usr/share/man/man1/genrsa.1ssl.gz
    • /usr/share/man/man1/md2.1ssl.gz
    • /usr/share/man/man1/md4.1ssl.gz
    • /usr/share/man/man1/md5.1ssl.gz
    • /usr/share/man/man1/mdc2.1ssl.gz
    • /usr/share/man/man1/nseq.1ssl.gz
    • /usr/share/man/man1/ocsp.1ssl.gz
    • /usr/share/man/man1/openssl.1ssl.gz
    • /usr/share/man/man1/passwd.1ssl.gz
    • /usr/share/man/man1/pkcs12.1ssl.gz
    • /usr/share/man/man1/pkcs7.1ssl.gz
    • /usr/share/man/man1/pkcs8.1ssl.gz
    • /usr/share/man/man1/pkey.1ssl.gz
    • /usr/share/man/man1/pkeyparam.1ssl.gz
    • /usr/share/man/man1/pkeyutl.1ssl.gz
    • /usr/share/man/man1/rand.1ssl.gz
    • /usr/share/man/man1/req.1ssl.gz
    • /usr/share/man/man1/ripemd160.1ssl.gz
    • /usr/share/man/man1/rsa.1ssl.gz
    • /usr/share/man/man1/rsautl.1ssl.gz
    • /usr/share/man/man1/s_client.1ssl.gz
    • /usr/share/man/man1/s_server.1ssl.gz
    • /usr/share/man/man1/s_time.1ssl.gz
    • /usr/share/man/man1/sess_id.1ssl.gz
    • /usr/share/man/man1/sha.1ssl.gz
    • /usr/share/man/man1/sha1.1ssl.gz
    • /usr/share/man/man1/smime.1ssl.gz
    • /usr/share/man/man1/speed.1ssl.gz
    • /usr/share/man/man1/spkac.1ssl.gz
    • /usr/share/man/man1/ts.1ssl.gz
    • /usr/share/man/man1/tsget.1ssl.gz
    • /usr/share/man/man1/verify.1ssl.gz
    • /usr/share/man/man1/version.1ssl.gz
    • /usr/share/man/man1/x509.1ssl.gz
    • /usr/share/man/man5/config.5ssl.gz
    • /usr/share/man/man5/x509v3_config.5ssl.gz
    • /usr/share/man/man7/des_modes.7ssl.gz

    Changelog

    2016-02-28 - Kurt Roeckx <kurt@roeckx.be> openssl (1.0.1e-2+deb7u20) wheezy-security; urgency=medium * Fix CVE-2016-0797 * Fix CVE-2016-0798 * Fix CVE-2016-0799 * Fix CVE-2016-0702 * Fix CVE-2016-0705 * Disable EXPORT and LOW ciphers: The DROWN attack (CVE-2016-0800) makes use of those, and SLOTH attack (CVE-2015-7575) can make use of them too.

    2016-01-07 - Salvatore Bonaccorso <carnil@debian.org> openssl (1.0.1e-2+deb7u19) wheezy-security; urgency=high * Non-maintainer upload by the Security Team. * Add CVE-2015-7575.patch patch. CVE-2015-7575: SLOTH: Security Losses from Obsolete and Truncated Transcript Hashes.

    2015-12-03 - Kurt Roeckx <kurt@roeckx.be> openssl (1.0.1e-2+deb7u18) wheezy-security; urgency=medium * Fix CVE-2015-3194 * Fix CVE-2015-3195 * Fix CVE-2015-3196

    2015-06-13 - Kurt Roeckx <kurt@roeckx.be> openssl (1.0.1e-2+deb7u17) wheezy-security; urgency=medium * Fix CVE-2015-1791 * Fix CVE-2015-1792 * Fix CVE-2015-1789 * Fix CVE-2015-1790 * Fix CVE-2015-1788 * Fix CVE-2015-4000 * Fix CVE-2014-8176

    2015-03-19 - Kurt Roeckx <kurt@roeckx.be> openssl (1.0.1e-2+deb7u16) wheezy-security; urgency=medium * Revert patch 0003-Free-up-passed-ASN.1-structure-if-reused.patch, it breaks nginx and doesn't have a security issue * Add patch 0008-Fix-a-failure-to-NULL-a-pointer-freed-on-error.patch as follow up to CVE-2015-0209

    2015-03-17 - Kurt Roeckx <kurt@roeckx.be> openssl (1.0.1e-2+deb7u15) wheezy-security; urgency=medium * Fix CVE-2015-0286 * Fix CVE-2015-0287 * Fix CVE-2015-0289 * Fix CVE-2015-0292 * Fix CVE-2015-0293 (not affected, SSLv2 disabled) * Fix CVE-2015-0209 * Fix CVE-2015-0288 * Remove export ciphers from DEFAULT. * Make DTLS always act as if read_ahead is set. This fixes a regression introduce by the fix for CVE-2014-3571. (Closes: #775502) * Fix error codes.

    2014-10-15 - Kurt Roeckx <kurt@roeckx.be> openssl (1.0.1e-2+deb7u13) wheezy-security; urgency=medium * Fixes CVE-2014-3513 * Fixes CVE-2014-3567 * Add Fallback SCSV support to mitigate CVE-2014-3566 * Fixes CVE-2014-3568

    2014-08-06 - Kurt Roeckx <kurt@roeckx.be> openssl (1.0.1e-2+deb7u12) wheezy-security; urgency=medium * Fix for CVE-2014-3512 * Fix for CVE-2014-3511 * Fix for CVE-2014-3510 * Fix for CVE-2014-3507 * Fix for CVE-2014-3506 * Fix for CVE-2014-3505 * Fix for CVE-2014-3509 * Fix for CVE-2014-5139 * Fix for CVE-2014-3508

    2014-06-15 - Kurt Roeckx <kurt@roeckx.be> openssl (1.0.1e-2+deb7u11) wheezy-security; urgency=medium * Update fix for CVE-2014-0224 to work with more renegiotation and resumption cases. (Closes: #751093) * Fix CVE-2012-4929 (CRiME) by disabling zlib compression by default. It can be enabled again by setting the environment variable OPENSSL_NO_DEFAULT_ZLIB. (Closes: #728055) * Update ECDHE-ECDSA_Safari.patch to define SSL_OP_MSIE_SSLV2_RSA_PADDING again but to 0 so things keep building. (Closes: #751457)

    Advertisement
    Advertisement