aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/libs/openssl/NEWS
diff options
context:
space:
mode:
authorheretic <heretic@yandex-team.ru>2022-02-10 16:45:43 +0300
committerDaniil Cherednik <dcherednik@yandex-team.ru>2022-02-10 16:45:43 +0300
commit397cbe258b9e064f49c4ca575279f02f39fef76e (patch)
treea0b0eb3cca6a14e4e8ea715393637672fa651284 /contrib/libs/openssl/NEWS
parent43f5a35593ebc9f6bcea619bb170394ea7ae468e (diff)
downloadydb-397cbe258b9e064f49c4ca575279f02f39fef76e.tar.gz
Restoring authorship annotation for <heretic@yandex-team.ru>. Commit 1 of 2.
Diffstat (limited to 'contrib/libs/openssl/NEWS')
-rw-r--r--contrib/libs/openssl/NEWS70
1 files changed, 35 insertions, 35 deletions
diff --git a/contrib/libs/openssl/NEWS b/contrib/libs/openssl/NEWS
index 5a1207c66e..54eaf14a80 100644
--- a/contrib/libs/openssl/NEWS
+++ b/contrib/libs/openssl/NEWS
@@ -5,41 +5,41 @@
This file gives a brief overview of the major changes between each OpenSSL
release. For more details please read the CHANGES file.
- Major changes between OpenSSL 1.1.1k and OpenSSL 1.1.1l [24 Aug 2021]
-
- o Fixed an SM2 Decryption Buffer Overflow (CVE-2021-3711)
- o Fixed various read buffer overruns processing ASN.1 strings (CVE-2021-3712)
-
- Major changes between OpenSSL 1.1.1j and OpenSSL 1.1.1k [25 Mar 2021]
-
- o Fixed a problem with verifying a certificate chain when using the
- X509_V_FLAG_X509_STRICT flag (CVE-2021-3450)
- o Fixed an issue where an OpenSSL TLS server may crash if sent a
- maliciously crafted renegotiation ClientHello message from a client
- (CVE-2021-3449)
-
- Major changes between OpenSSL 1.1.1i and OpenSSL 1.1.1j [16 Feb 2021]
-
- o Fixed a NULL pointer deref in the X509_issuer_and_serial_hash()
- function (CVE-2021-23841)
- o Fixed the RSA_padding_check_SSLv23() function and the RSA_SSLV23_PADDING
- padding mode to correctly check for rollback attacks
- o Fixed an overflow in the EVP_CipherUpdate, EVP_EncryptUpdate and
- EVP_DecryptUpdate functions (CVE-2021-23840)
- o Fixed SRP_Calc_client_key so that it runs in constant time
-
- Major changes between OpenSSL 1.1.1h and OpenSSL 1.1.1i [8 Dec 2020]
-
- o Fixed NULL pointer deref in GENERAL_NAME_cmp (CVE-2020-1971)
-
- Major changes between OpenSSL 1.1.1g and OpenSSL 1.1.1h [22 Sep 2020]
-
- o Disallow explicit curve parameters in verifications chains when
- X509_V_FLAG_X509_STRICT is used
- o Enable 'MinProtocol' and 'MaxProtocol' to configure both TLS and DTLS
- contexts
- o Oracle Developer Studio will start reporting deprecation warnings
-
+ Major changes between OpenSSL 1.1.1k and OpenSSL 1.1.1l [24 Aug 2021]
+
+ o Fixed an SM2 Decryption Buffer Overflow (CVE-2021-3711)
+ o Fixed various read buffer overruns processing ASN.1 strings (CVE-2021-3712)
+
+ Major changes between OpenSSL 1.1.1j and OpenSSL 1.1.1k [25 Mar 2021]
+
+ o Fixed a problem with verifying a certificate chain when using the
+ X509_V_FLAG_X509_STRICT flag (CVE-2021-3450)
+ o Fixed an issue where an OpenSSL TLS server may crash if sent a
+ maliciously crafted renegotiation ClientHello message from a client
+ (CVE-2021-3449)
+
+ Major changes between OpenSSL 1.1.1i and OpenSSL 1.1.1j [16 Feb 2021]
+
+ o Fixed a NULL pointer deref in the X509_issuer_and_serial_hash()
+ function (CVE-2021-23841)
+ o Fixed the RSA_padding_check_SSLv23() function and the RSA_SSLV23_PADDING
+ padding mode to correctly check for rollback attacks
+ o Fixed an overflow in the EVP_CipherUpdate, EVP_EncryptUpdate and
+ EVP_DecryptUpdate functions (CVE-2021-23840)
+ o Fixed SRP_Calc_client_key so that it runs in constant time
+
+ Major changes between OpenSSL 1.1.1h and OpenSSL 1.1.1i [8 Dec 2020]
+
+ o Fixed NULL pointer deref in GENERAL_NAME_cmp (CVE-2020-1971)
+
+ Major changes between OpenSSL 1.1.1g and OpenSSL 1.1.1h [22 Sep 2020]
+
+ o Disallow explicit curve parameters in verifications chains when
+ X509_V_FLAG_X509_STRICT is used
+ o Enable 'MinProtocol' and 'MaxProtocol' to configure both TLS and DTLS
+ contexts
+ o Oracle Developer Studio will start reporting deprecation warnings
+
Major changes between OpenSSL 1.1.1f and OpenSSL 1.1.1g [21 Apr 2020]
o Fixed segmentation fault in SSL_check_chain() (CVE-2020-1967)