diff options
-rw-r--r-- | ChangeLog | 34 |
1 files changed, 34 insertions, 0 deletions
@@ -28,6 +28,40 @@ history is also available from Git. | |||
28 | 28 | ||
29 | LibreSSL Portable Release Notes: | 29 | LibreSSL Portable Release Notes: |
30 | 30 | ||
31 | 2.3.2 - Compatibility and Reliability fixes | ||
32 | |||
33 | * Changed format of LIBRESSL_VERSION_NUMBER to match that of | ||
34 | OPENSSL_VERSION_NUMBER, see: | ||
35 | https://wiki.openssl.org/index.php/Manual:OPENSSL_VERSION_NUMBER(3) | ||
36 | |||
37 | * Added EVP_aead_chacha20_poly1305_ietf() which matches the AEAD | ||
38 | construction introduced in RFC 7539, which is different than that | ||
39 | already used in TLS with EVP_aead_chacha20_poly1305() | ||
40 | |||
41 | * Avoid a potential undefined C99+ behavior due to shift overflow in | ||
42 | AES_decrypt, reported by Pascal Cuoq <cuoq at trust-in-soft.com> | ||
43 | |||
44 | * More man pages converted from pod to mdoc format | ||
45 | |||
46 | * Added QuoVadis root certificates to cert.pem | ||
47 | |||
48 | * Added support for building nc(1) on Solaris | ||
49 | |||
50 | * Fixed GCC 5.x+ preprocessor checks, reported by Ruslan Babayev | ||
51 | |||
52 | * Fixes from OpenSSL 1.0.1q | ||
53 | - CVE-2015-3194 - NULL pointer dereference in client side certificate | ||
54 | validation. | ||
55 | - CVE-2015-3195 - Memory leak in PKCS7 - not reachable from TLS/SSL | ||
56 | |||
57 | * The following OpenSSL CVEs did not apply to LibreSSL | ||
58 | - CVE-2015-3193 - Carry propagating bug in the x86_64 Montgomery | ||
59 | squaring procedure. | ||
60 | - CVE-2015-3196 - Double free race condition of the identify hint | ||
61 | data. | ||
62 | |||
63 | See https://marc.info/?l=openbsd-announce&m=144925068504102 | ||
64 | |||
31 | 2.3.1 - ASN.1 and time handling cleanups | 65 | 2.3.1 - ASN.1 and time handling cleanups |
32 | 66 | ||
33 | * ASN.1 cleanups and RFC5280 compliance fixes. | 67 | * ASN.1 cleanups and RFC5280 compliance fixes. |