diff options
| author | Theo Buehler <tb@openbsd.org> | 2023-03-15 02:03:00 -0600 |
|---|---|---|
| committer | Theo Buehler <tb@openbsd.org> | 2023-03-15 02:03:00 -0600 |
| commit | 047fddbee9f34c16a82e66ecbe1058bb8810e82f (patch) | |
| tree | 514cb966af8139699cf71f96a05a568a6ab3e178 /ChangeLog | |
| parent | 42a3218362cc9494d017edd49923c4add876c8c3 (diff) | |
| download | portable-047fddbee9f34c16a82e66ecbe1058bb8810e82f.tar.gz portable-047fddbee9f34c16a82e66ecbe1058bb8810e82f.tar.bz2 portable-047fddbee9f34c16a82e66ecbe1058bb8810e82f.zip | |
Minimal 3.7.1 ChangeLog
Diffstat (limited to 'ChangeLog')
| -rw-r--r-- | ChangeLog | 27 |
1 files changed, 27 insertions, 0 deletions
| @@ -28,6 +28,33 @@ history is also available from Git. | |||
| 28 | 28 | ||
| 29 | LibreSSL Portable Release Notes: | 29 | LibreSSL Portable Release Notes: |
| 30 | 30 | ||
| 31 | 3.7.1 - Development release | ||
| 32 | |||
| 33 | * Internal improvements | ||
| 34 | - Initial overhaul of the BIGNUM code: | ||
| 35 | - Added a new framework that allows architecture-dependent | ||
| 36 | replacement implementations for bignum primitives | ||
| 37 | - Imported s2n-bignum's constant time assembly primitives. | ||
| 38 | Use them for amd64 and arm64. | ||
| 39 | - Lots of cleanup, simplification and bug fixes | ||
| 40 | - Assorted initial cleanup in the EC code | ||
| 41 | - Fixed Perl assembly generators to move constants into .rodata. | ||
| 42 | This allows code to run with execute-only permissions | ||
| 43 | * Bug fixes | ||
| 44 | - Fixed a memory leak, a double free and various other issues in | ||
| 45 | BIO_new_NDEF() | ||
| 46 | - Avoid infinite loops in DSA and ECDSA signing | ||
| 47 | - Check DSA parameter sanity | ||
| 48 | - Fixed various crashes in the openssl(1) testing utility | ||
| 49 | - Do not check policies by default in the new X.509 verifier | ||
| 50 | * Public API: | ||
| 51 | - added EVP_CIPHER_meth_* support (only setters) | ||
| 52 | - UI_null(), X509_CRL_get0_tbs_sigalg(), X509_STORE_*check_issued(), | ||
| 53 | X509_get0_uids() | ||
| 54 | * Security fix | ||
| 55 | - A malicious certificate revocation list or timestamp response token | ||
| 56 | would allow an attacker to read arbitrary memory. | ||
| 57 | |||
| 31 | 3.7.0 - Development release | 58 | 3.7.0 - Development release |
| 32 | 59 | ||
| 33 | * Internal improvements | 60 | * Internal improvements |
