openssl

Description:Robust, full-featured Open Source Toolkit for the Transport Layer Security (TLS)
License: Apache-2.0
Homepage:https://www.openssl.org/
Location:Portage
Legend:
  • + - stable
  • ~ - unstable
  • M - hardmask
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
3.1.3 diff ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ - ~ ~
3.1.2 diff ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ - ~ ~
3.0.11 diff ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ - ~ ~
3.0.10 diff ~ + + + ~ ~ ~ + + ~ - + +
3.0.9-r2 diff ~ + + + ~ ~ ~ + + ~ - + +
3.0.9-r1 diff ~ + + + ~ ~ ~ + + ~ - + +
1.1.1w diff ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ - ~ ~
1.1.1u diff ~ + + + ~ ~ ~ + + ~ - + +
1.0.2u-r1 ~ + + + ~ ~ ~ + + ~ - + +

USE flags

  • abi_mips_n32 - 64-bit (32-bit pointer) libraries
  • abi_mips_n64 - 64-bit libraries
  • abi_mips_o32 - 32-bit libraries
  • abi_s390_32 - 32-bit (s390) libraries
  • abi_s390_64 - 64-bit (s390x) libraries
  • abi_x86_32 - 32-bit (x86) libraries
  • abi_x86_64 - 64-bit (amd64) libraries
  • abi_x86_x32 - x32 ABI libraries
  • asm - Support assembly hand optimized crypto functions (i.e. faster run time)
  • bindist - Disable/Restrict EC algorithms (as they seem to be patented) -- note: changes the ABI
  • cpu_flags_x86_sse2 - Use the SSE2 instruction set
  • fips - Enable FIPS provider
  • gmp - Add support for dev-libs/gmp (GNU MP library)
  • kerberos - Add kerberos support
  • ktls - Enable support for Kernel implementation of TLS (kTLS)
  • rfc3779 - Enable support for RFC 3779 (X.509 Extensions for IP Addresses and AS Identifiers)
  • sctp - Support for Stream Control Transmission Protocol
  • sslv2 - Support for the old/insecure SSLv2 protocol -- note: not required for TLS/https
  • sslv3 - Support for the old/insecure SSLv3 protocol -- note: not required for TLS/https
  • static-libs - Build static versions of dynamic libraries as well
  • test - Enable dependencies and/or preparations necessary to run tests (usually controlled by FEATURES=test but can be toggled independently)
  • tls-compression - Enable support for discouraged TLS compression
  • tls-heartbeat - Enable the Heartbeat Extension in TLS and DTLS
  • vanilla - Do not add extra patches which change default behaviour; DO NOT USE THIS ON A GLOBAL SCALE as the severity of the meaning changes drastically
  • verify-sig - Verify upstream signatures on distfiles
  • weak-ssl-ciphers - Build support for SSL/TLS ciphers that are considered "weak"

Security Advisory

Date Severity Title
about 2 years normal OpenSSL: Multiple Vulnerabilities
about 2 years normal OpenSSL: Multiple Vulnerabilities
over 3 years normal OpenSSL: Multiple vulnerabilities
almost 4 years low OpenSSL: Denial of service
over 4 years normal OpenSSL: Multiple vulnerabilities
about 5 years low OpenSSL: Multiple vulnerabilities
over 5 years normal OpenSSL: Multiple vulnerabilities
almost 6 years normal OpenSSL: Multiple vulnerabilities
about 6 years normal OpenSSL: Denial of Service
almost 7 years normal OpenSSL: Multiple vulnerabilities
almost 8 years normal OpenSSL: Multiple vulnerabilities
almost 8 years normal OpenSSL: Multiple vulnerabilities
over 8 years normal OpenSSL: Multiple vulnerabilities
almost 9 years normal OpenSSL: Multiple vulnerabilities
over 9 years normal OpenSSL: Alternate chains certificate forgery
over 9 years normal OpenSSL: Multiple vulnerabilities
over 9 years normal OpenSSL: Multiple vulnerabilities
almost 10 years normal OpenSSL: Multiple vulnerabilities
over 10 years high OpenSSL: Multiple vulnerabilities
over 10 years normal OpenSSL: Information Disclosure
almost 11 years normal OpenSSL: Denial of Service
almost 11 years low OpenSSL: Multiple Vulnerabilities
over 12 years normal OpenSSL: Multiple vulnerabilities
about 13 years high OpenSSL: Multiple vulnerabilities
almost 15 years normal OpenSSL: Multiple vulnerabilities
over 15 years normal OpenSSL: Denial of Service
almost 16 years normal OpenSSL: Certificate validation error
over 16 years normal OpenSSL: Denial of Service
about 17 years high OpenSSL: Remote execution of arbitrary code
about 17 years high OpenSSL: Multiple vulnerabilities
about 18 years high OpenSSL: Multiple vulnerabilities
about 18 years normal OpenSSL, AMD64 x86 emulation base libraries: RSA signature forgery
about 19 years low OpenSSL: SSL 2.0 protocol rollback
about 20 years normal OpenSSL, Groff: Insecure tempfile handling
over 20 years normal Multiple OpenSSL Vulnerabilities

Also available in: Atom

Thank you!