![]() Fixed AES OCB failure to encrypt some bytes on 32-bit x86 platforms.Fixed heap memory corruption with RSA private key operation. ![]() Major changes between OpenSSL 3.0.4 and OpenSSL 3.0.5 Fix for custom ciphers to prevent accidental use of NULL encryption.Major changes between OpenSSL 3.0.5 and OpenSSL 3.0.6 Fixed two buffer overflows in punycode decoding functions.Fixed regressions introduced in 3.0.6 version.Added RIPEMD160 to the default provider.Major changes between OpenSSL 3.0.6 and OpenSSL 3.0.7 Fixed X.509 Policy Constraints Double Locking ().Fixed X.509 Name Constraints Read Buffer Overflow ().Fixed Timing Oracle in RSA Decryption ().Fixed Double free after calling PEM_read_bio_ex ().Fixed Use-after-free following BIO_new_NDEF ().Fixed Invalid pointer dereference in d2i_PKCS7 functions ().Fixed NULL dereference validating DSA public key ().Fixed X.400 address type confusion in X.509 GeneralName ().Fixed NULL dereference during PKCS7 data verification ().Major changes between OpenSSL 3.0.7 and OpenSSL 3.0.8 Limited the number of nodes created in a policy tree ().Fixed handling of invalid certificate policies in leaf certificates.Fixed documentation of X509_VERIFY_PARAM_add0_policy() ().Fixed buffer overread in AES-XTS decryption on ARM 64 bit platforms.Mitigate for very slow `OBJ_obj2txt()` performance with gigantic OBJECT.Major changes between OpenSSL 3.0.8 and OpenSSL 3.0.9 Do not ignore empty associated data entries with AES-SIV ().Fix DH_check() excessive time with over sized modulus ().Fix excessive time spent checking DH q parameter value ().Major changes between OpenSSL 3.0.9 and OpenSSL 3.0.10 More details can be found in the ChangeLog. The contents reflect the current state of the NEWS file inside the git repository. ![]() The major changes and known issues for the 3.0 branch of the OpenSSL toolkit are summarised below.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |