diff options
| author | Brent Cook <bcook@openbsd.org> | 2018-08-02 09:26:15 -0500 |
|---|---|---|
| committer | Brent Cook <bcook@openbsd.org> | 2018-08-02 09:26:15 -0500 |
| commit | 29fe12a73285d859ed068f1433bf5006f1da54f3 (patch) | |
| tree | 11d13fa1390bf8439f4cbf7e71f5ec9763304ee2 | |
| parent | a6db5d445d2fc53a4578e6f675f14c7aaff592c6 (diff) | |
| download | portable-29fe12a73285d859ed068f1433bf5006f1da54f3.tar.gz portable-29fe12a73285d859ed068f1433bf5006f1da54f3.tar.bz2 portable-29fe12a73285d859ed068f1433bf5006f1da54f3.zip | |
Update changelog for 2.8.0
| -rw-r--r-- | ChangeLog | 54 |
1 files changed, 54 insertions, 0 deletions
| @@ -28,6 +28,60 @@ history is also available from Git. | |||
| 28 | 28 | ||
| 29 | LibreSSL Portable Release Notes: | 29 | LibreSSL Portable Release Notes: |
| 30 | 30 | ||
| 31 | 2.8.0 - Bug fixes and improvements | ||
| 32 | |||
| 33 | * Extensive documentation updates and additional API history. | ||
| 34 | |||
| 35 | * Fixed a pair of 20+ year-old bugs in X509_NAME_add_entry | ||
| 36 | |||
| 37 | * Tighten up checks for various X509_VERIFY_PARAM functions, | ||
| 38 | 'poisoning' parameters so that an unverified certificate cannot be | ||
| 39 | used if it fails verification. | ||
| 40 | |||
| 41 | * Fixed a potential memory leak on failure in ASN1_item_digest | ||
| 42 | |||
| 43 | * Fixed a potential memory alignment crash in asn1_item_combine_free | ||
| 44 | |||
| 45 | * Removed unused SSL3_FLAGS_DELAY_CLIENT_FINISHED and | ||
| 46 | SSL3_FLAGS_POP_BUFFER flags in write path, simplifying IO paths. | ||
| 47 | |||
| 48 | * Removed SSL_OP_TLS_ROLLBACK_BUG buggy client workarounds. | ||
| 49 | |||
| 50 | * Made ENGINE_finish and ENGINE_free succeed on NULL and simplify callers | ||
| 51 | and matching OpenSSL behavior, rewrote ENGINE_* documentation. | ||
| 52 | |||
| 53 | * Added const annotations to many existing APIs. | ||
| 54 | |||
| 55 | * Fixed small timing side-channels in ecdsa_sign_setup and | ||
| 56 | dsa_sign_setup. | ||
| 57 | |||
| 58 | * Documented security pitfalls with BN_FLG_CONSTTIME and constant-time | ||
| 59 | operation of BN_* functions. | ||
| 60 | |||
| 61 | * Updated BN_clear to use explicit_bzero. | ||
| 62 | |||
| 63 | * Added a missing bounds check in c2i_ASN1_BIT_STRING. | ||
| 64 | |||
| 65 | * More CBS conversions, including simplifications to RSA key exchange, | ||
| 66 | and converted code to use dedicated buffers for secrets. | ||
| 67 | |||
| 68 | * Removed three remaining single DES cipher suites. | ||
| 69 | |||
| 70 | * Fixed a potential leak/incorrect return value in DSA signature generation. | ||
| 71 | |||
| 72 | * Added a blinding value when generating DSA and ECDSA signatures, in | ||
| 73 | order to reduce the possibility of a side-channel attack leaking the | ||
| 74 | private key. | ||
| 75 | |||
| 76 | * Added ECC constant time scalar multiplication support. | ||
| 77 | From Billy Brumley and his team. | ||
| 78 | |||
| 79 | * Implemented RSASSA-PKCS1-v1_5 as specified in RFC 8017. | ||
| 80 | Based on an OpenSSL commit by David Benjamin. | ||
| 81 | |||
| 82 | * Cleaned up BN_* implementations following changes made in OpenSSL by | ||
| 83 | Davide Galassi and others. | ||
| 84 | |||
| 31 | 2.7.4 - Security fixes | 85 | 2.7.4 - Security fixes |
| 32 | 86 | ||
| 33 | * Avoid a timing side-channel leak when generating DSA and ECDSA | 87 | * Avoid a timing side-channel leak when generating DSA and ECDSA |
