diff options
author | heretic <heretic@yandex-team.ru> | 2022-02-10 16:45:43 +0300 |
---|---|---|
committer | Daniil Cherednik <dcherednik@yandex-team.ru> | 2022-02-10 16:45:43 +0300 |
commit | 397cbe258b9e064f49c4ca575279f02f39fef76e (patch) | |
tree | a0b0eb3cca6a14e4e8ea715393637672fa651284 /contrib/libs/openssl/NEWS | |
parent | 43f5a35593ebc9f6bcea619bb170394ea7ae468e (diff) | |
download | ydb-397cbe258b9e064f49c4ca575279f02f39fef76e.tar.gz |
Restoring authorship annotation for <heretic@yandex-team.ru>. Commit 1 of 2.
Diffstat (limited to 'contrib/libs/openssl/NEWS')
-rw-r--r-- | contrib/libs/openssl/NEWS | 70 |
1 files changed, 35 insertions, 35 deletions
diff --git a/contrib/libs/openssl/NEWS b/contrib/libs/openssl/NEWS index 5a1207c66e..54eaf14a80 100644 --- a/contrib/libs/openssl/NEWS +++ b/contrib/libs/openssl/NEWS @@ -5,41 +5,41 @@ This file gives a brief overview of the major changes between each OpenSSL release. For more details please read the CHANGES file. - Major changes between OpenSSL 1.1.1k and OpenSSL 1.1.1l [24 Aug 2021] - - o Fixed an SM2 Decryption Buffer Overflow (CVE-2021-3711) - o Fixed various read buffer overruns processing ASN.1 strings (CVE-2021-3712) - - Major changes between OpenSSL 1.1.1j and OpenSSL 1.1.1k [25 Mar 2021] - - o Fixed a problem with verifying a certificate chain when using the - X509_V_FLAG_X509_STRICT flag (CVE-2021-3450) - o Fixed an issue where an OpenSSL TLS server may crash if sent a - maliciously crafted renegotiation ClientHello message from a client - (CVE-2021-3449) - - Major changes between OpenSSL 1.1.1i and OpenSSL 1.1.1j [16 Feb 2021] - - o Fixed a NULL pointer deref in the X509_issuer_and_serial_hash() - function (CVE-2021-23841) - o Fixed the RSA_padding_check_SSLv23() function and the RSA_SSLV23_PADDING - padding mode to correctly check for rollback attacks - o Fixed an overflow in the EVP_CipherUpdate, EVP_EncryptUpdate and - EVP_DecryptUpdate functions (CVE-2021-23840) - o Fixed SRP_Calc_client_key so that it runs in constant time - - Major changes between OpenSSL 1.1.1h and OpenSSL 1.1.1i [8 Dec 2020] - - o Fixed NULL pointer deref in GENERAL_NAME_cmp (CVE-2020-1971) - - Major changes between OpenSSL 1.1.1g and OpenSSL 1.1.1h [22 Sep 2020] - - o Disallow explicit curve parameters in verifications chains when - X509_V_FLAG_X509_STRICT is used - o Enable 'MinProtocol' and 'MaxProtocol' to configure both TLS and DTLS - contexts - o Oracle Developer Studio will start reporting deprecation warnings - + Major changes between OpenSSL 1.1.1k and OpenSSL 1.1.1l [24 Aug 2021] + + o Fixed an SM2 Decryption Buffer Overflow (CVE-2021-3711) + o Fixed various read buffer overruns processing ASN.1 strings (CVE-2021-3712) + + Major changes between OpenSSL 1.1.1j and OpenSSL 1.1.1k [25 Mar 2021] + + o Fixed a problem with verifying a certificate chain when using the + X509_V_FLAG_X509_STRICT flag (CVE-2021-3450) + o Fixed an issue where an OpenSSL TLS server may crash if sent a + maliciously crafted renegotiation ClientHello message from a client + (CVE-2021-3449) + + Major changes between OpenSSL 1.1.1i and OpenSSL 1.1.1j [16 Feb 2021] + + o Fixed a NULL pointer deref in the X509_issuer_and_serial_hash() + function (CVE-2021-23841) + o Fixed the RSA_padding_check_SSLv23() function and the RSA_SSLV23_PADDING + padding mode to correctly check for rollback attacks + o Fixed an overflow in the EVP_CipherUpdate, EVP_EncryptUpdate and + EVP_DecryptUpdate functions (CVE-2021-23840) + o Fixed SRP_Calc_client_key so that it runs in constant time + + Major changes between OpenSSL 1.1.1h and OpenSSL 1.1.1i [8 Dec 2020] + + o Fixed NULL pointer deref in GENERAL_NAME_cmp (CVE-2020-1971) + + Major changes between OpenSSL 1.1.1g and OpenSSL 1.1.1h [22 Sep 2020] + + o Disallow explicit curve parameters in verifications chains when + X509_V_FLAG_X509_STRICT is used + o Enable 'MinProtocol' and 'MaxProtocol' to configure both TLS and DTLS + contexts + o Oracle Developer Studio will start reporting deprecation warnings + Major changes between OpenSSL 1.1.1f and OpenSSL 1.1.1g [21 Apr 2020] o Fixed segmentation fault in SSL_check_chain() (CVE-2020-1967) |