diff options
| author | Theo Buehler <tb@openbsd.org> | 2020-12-08 16:15:35 +0100 |
|---|---|---|
| committer | Theo Buehler <tb@openbsd.org> | 2020-12-08 16:15:35 +0100 |
| commit | c50f8e2c6c066be053a2886cfddc41992fb2ca82 (patch) | |
| tree | 108d1605bf67249031d25fd511a98c50c249a8f6 | |
| parent | 7734eb9c8a9a2e7bd60746779ac0fc014090b179 (diff) | |
| download | portable-3.3.1.tar.gz portable-3.3.1.tar.bz2 portable-3.3.1.zip | |
Release notes for GENERAL_NAME_cmp() NULL derefv3.3.1
| -rw-r--r-- | ChangeLog | 15 |
1 files changed, 15 insertions, 0 deletions
| @@ -28,6 +28,11 @@ history is also available from Git. | |||
| 28 | 28 | ||
| 29 | LibreSSL Portable Release Notes: | 29 | LibreSSL Portable Release Notes: |
| 30 | 30 | ||
| 31 | 3.3.1 - Security fix | ||
| 32 | |||
| 33 | * Malformed ASN.1 in a certificate revocation list or a timestamp | ||
| 34 | response token can lead to a NULL pointer dereference. | ||
| 35 | |||
| 31 | 3.3.0 - Development release | 36 | 3.3.0 - Development release |
| 32 | 37 | ||
| 33 | * Make openssl(1) s_server ignore -4 and -6 for compatibility with | 38 | * Make openssl(1) s_server ignore -4 and -6 for compatibility with |
| @@ -129,6 +134,11 @@ LibreSSL Portable Release Notes: | |||
| 129 | 134 | ||
| 130 | * Various documentation improvements, particularly around TLS methods. | 135 | * Various documentation improvements, particularly around TLS methods. |
| 131 | 136 | ||
| 137 | 3.2.3 - Security fix | ||
| 138 | |||
| 139 | * Malformed ASN.1 in a certificate revocation list or a timestamp | ||
| 140 | response token can lead to a NULL pointer dereference. | ||
| 141 | |||
| 132 | 3.2.2 - Stable release | 142 | 3.2.2 - Stable release |
| 133 | 143 | ||
| 134 | * This is the first stable release with the new TLSv1.3 | 144 | * This is the first stable release with the new TLSv1.3 |
| @@ -380,6 +390,11 @@ LibreSSL Portable Release Notes: | |||
| 380 | 390 | ||
| 381 | * Use non-expired certificates first when building a certificate chain. | 391 | * Use non-expired certificates first when building a certificate chain. |
| 382 | 392 | ||
| 393 | 3.1.5 - Security fix | ||
| 394 | |||
| 395 | * Malformed ASN.1 in a certificate revocation list or a timestamp | ||
| 396 | response token can lead to a NULL pointer dereference. | ||
| 397 | |||
| 383 | 3.1.4 - Interoperability and bug fixes for the TLSv1.3 client: | 398 | 3.1.4 - Interoperability and bug fixes for the TLSv1.3 client: |
| 384 | 399 | ||
| 385 | * Improve client certificate selection to allow EC certificates | 400 | * Improve client certificate selection to allow EC certificates |
