diff options
| -rw-r--r-- | ChangeLog | 15 |
1 files changed, 15 insertions, 0 deletions
| @@ -28,6 +28,11 @@ history is also available from Git. | |||
| 28 | 28 | ||
| 29 | LibreSSL Portable Release Notes: | 29 | LibreSSL Portable Release Notes: |
| 30 | 30 | ||
| 31 | 3.3.1 - Security fix | ||
| 32 | |||
| 33 | * Malformed ASN.1 in a certificate revocation list or a timestamp | ||
| 34 | response token can lead to a NULL pointer dereference. | ||
| 35 | |||
| 31 | 3.3.0 - Development release | 36 | 3.3.0 - Development release |
| 32 | 37 | ||
| 33 | * Make openssl(1) s_server ignore -4 and -6 for compatibility with | 38 | * Make openssl(1) s_server ignore -4 and -6 for compatibility with |
| @@ -129,6 +134,11 @@ LibreSSL Portable Release Notes: | |||
| 129 | 134 | ||
| 130 | * Various documentation improvements, particularly around TLS methods. | 135 | * Various documentation improvements, particularly around TLS methods. |
| 131 | 136 | ||
| 137 | 3.2.3 - Security fix | ||
| 138 | |||
| 139 | * Malformed ASN.1 in a certificate revocation list or a timestamp | ||
| 140 | response token can lead to a NULL pointer dereference. | ||
| 141 | |||
| 132 | 3.2.2 - Stable release | 142 | 3.2.2 - Stable release |
| 133 | 143 | ||
| 134 | * This is the first stable release with the new TLSv1.3 | 144 | * This is the first stable release with the new TLSv1.3 |
| @@ -380,6 +390,11 @@ LibreSSL Portable Release Notes: | |||
| 380 | 390 | ||
| 381 | * Use non-expired certificates first when building a certificate chain. | 391 | * Use non-expired certificates first when building a certificate chain. |
| 382 | 392 | ||
| 393 | 3.1.5 - Security fix | ||
| 394 | |||
| 395 | * Malformed ASN.1 in a certificate revocation list or a timestamp | ||
| 396 | response token can lead to a NULL pointer dereference. | ||
| 397 | |||
| 383 | 3.1.4 - Interoperability and bug fixes for the TLSv1.3 client: | 398 | 3.1.4 - Interoperability and bug fixes for the TLSv1.3 client: |
| 384 | 399 | ||
| 385 | * Improve client certificate selection to allow EC certificates | 400 | * Improve client certificate selection to allow EC certificates |
