- 
    Thu Jul 07 2022 Darren Archibald <darren.archibald@oracle.com> - 1:3.0.1-23.0.1
    
- Replace upstream references [Orabug: 34340177]
   
  
  - 
    Tue Apr 26 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-23
    
- Update missing initialization patch with feedback from upstream
  Resolves: rhbz#2076654
   
  
  - 
    Fri Apr 22 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-22
    
- Invocation of the missing initialization
- Resolves: rhbz#2076654
   
  
  - 
    Wed Apr 20 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-21
    
- Fix openssl curl error with LANG=tr_TR.utf8
- Resolves: rhbz#2076654
   
  
  - 
    Fri Mar 18 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-20
    
- Fix acceptance of SHA-1 certificates with rh-allow-sha1-signatures = yes when
  no OpenSSL library context is set
- Resolves: rhbz#2063306
   
  
  - 
    Fri Mar 18 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-19
    
- Fix TLS connections with SHA1 signatures if rh-allow-sha1-signatures = yes
- Resolves: rhbz#2063306
   
  
  - 
    Wed Mar 16 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-18
    
- CVE-2022-0778 fix
- Resolves: rhbz#2062314
   
  
  - 
    Thu Mar 10 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-15.1
    
- Fix invocation of EVP_PKEY_CTX_set_rsa_padding(RSA_PKCS1_PSS_PADDING) before
  setting an allowed digest with EVP_PKEY_CTX_set_signature_md()
- Resolves: rhbz#2061607
   
  
  - 
    Tue Mar 01 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-14.1
    
- Allow SHA1 in SECLEVEL 2 if rh-allow-sha1-signatures = yes
- Resolves: rhbz#2031742
   
  
  - 
    Fri Feb 25 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-14
    
- Prevent use of SHA1 with ECDSA
- Resolves: rhbz#2031742