diff options
author | Theo Buehler <tb@openbsd.org> | 2020-12-08 16:15:35 +0100 |
---|---|---|
committer | Theo Buehler <tb@openbsd.org> | 2020-12-08 16:15:35 +0100 |
commit | c50f8e2c6c066be053a2886cfddc41992fb2ca82 (patch) | |
tree | 108d1605bf67249031d25fd511a98c50c249a8f6 | |
parent | 7734eb9c8a9a2e7bd60746779ac0fc014090b179 (diff) | |
download | portable-c50f8e2c6c066be053a2886cfddc41992fb2ca82.tar.gz portable-c50f8e2c6c066be053a2886cfddc41992fb2ca82.tar.bz2 portable-c50f8e2c6c066be053a2886cfddc41992fb2ca82.zip |
Release notes for GENERAL_NAME_cmp() NULL derefv3.3.1
-rw-r--r-- | ChangeLog | 15 |
1 files changed, 15 insertions, 0 deletions
@@ -28,6 +28,11 @@ history is also available from Git. | |||
28 | 28 | ||
29 | LibreSSL Portable Release Notes: | 29 | LibreSSL Portable Release Notes: |
30 | 30 | ||
31 | 3.3.1 - Security fix | ||
32 | |||
33 | * Malformed ASN.1 in a certificate revocation list or a timestamp | ||
34 | response token can lead to a NULL pointer dereference. | ||
35 | |||
31 | 3.3.0 - Development release | 36 | 3.3.0 - Development release |
32 | 37 | ||
33 | * Make openssl(1) s_server ignore -4 and -6 for compatibility with | 38 | * Make openssl(1) s_server ignore -4 and -6 for compatibility with |
@@ -129,6 +134,11 @@ LibreSSL Portable Release Notes: | |||
129 | 134 | ||
130 | * Various documentation improvements, particularly around TLS methods. | 135 | * Various documentation improvements, particularly around TLS methods. |
131 | 136 | ||
137 | 3.2.3 - Security fix | ||
138 | |||
139 | * Malformed ASN.1 in a certificate revocation list or a timestamp | ||
140 | response token can lead to a NULL pointer dereference. | ||
141 | |||
132 | 3.2.2 - Stable release | 142 | 3.2.2 - Stable release |
133 | 143 | ||
134 | * This is the first stable release with the new TLSv1.3 | 144 | * This is the first stable release with the new TLSv1.3 |
@@ -380,6 +390,11 @@ LibreSSL Portable Release Notes: | |||
380 | 390 | ||
381 | * Use non-expired certificates first when building a certificate chain. | 391 | * Use non-expired certificates first when building a certificate chain. |
382 | 392 | ||
393 | 3.1.5 - Security fix | ||
394 | |||
395 | * Malformed ASN.1 in a certificate revocation list or a timestamp | ||
396 | response token can lead to a NULL pointer dereference. | ||
397 | |||
383 | 3.1.4 - Interoperability and bug fixes for the TLSv1.3 client: | 398 | 3.1.4 - Interoperability and bug fixes for the TLSv1.3 client: |
384 | 399 | ||
385 | * Improve client certificate selection to allow EC certificates | 400 | * Improve client certificate selection to allow EC certificates |