xref: /src/crypto/openssl/NEWS.md (revision f25b8c9fb4f58cf61adb47d7570abe7caa6d385d)
1e4520c8bSEnji CooperNEWS
2e4520c8bSEnji Cooper====
3e4520c8bSEnji Cooper
4e4520c8bSEnji CooperThis file gives a brief overview of the major changes between each OpenSSL
5e4520c8bSEnji Cooperrelease. For more details please read the CHANGES file.
6e4520c8bSEnji Cooper
7e4520c8bSEnji CooperOpenSSL Releases
8e4520c8bSEnji Cooper----------------
9e4520c8bSEnji Cooper
1029536654SEnji Cooper - [OpenSSL 3.5](#openssl-35)
1129536654SEnji Cooper - [OpenSSL 3.4](#openssl-34)
1229536654SEnji Cooper - [OpenSSL 3.3](#openssl-33)
1329536654SEnji Cooper - [OpenSSL 3.2](#openssl-32)
1429536654SEnji Cooper - [OpenSSL 3.1](#openssl-31)
15e4520c8bSEnji Cooper - [OpenSSL 3.0](#openssl-30)
16e4520c8bSEnji Cooper - [OpenSSL 1.1.1](#openssl-111)
17e4520c8bSEnji Cooper - [OpenSSL 1.1.0](#openssl-110)
18e4520c8bSEnji Cooper - [OpenSSL 1.0.2](#openssl-102)
19e4520c8bSEnji Cooper - [OpenSSL 1.0.1](#openssl-101)
20e4520c8bSEnji Cooper - [OpenSSL 1.0.0](#openssl-100)
21e4520c8bSEnji Cooper - [OpenSSL 0.9.x](#openssl-09x)
22e4520c8bSEnji Cooper
2329536654SEnji CooperOpenSSL 3.5
24e4520c8bSEnji Cooper-----------
25e4520c8bSEnji Cooper
26808413daSEnji Cooper### Major changes between OpenSSL 3.5.4 and OpenSSL 3.5.5 [27 Jan 2026]
27808413daSEnji Cooper
28808413daSEnji CooperOpenSSL 3.5.5 is a security patch release. The most severe CVE fixed in this
29808413daSEnji Cooperrelease is High.
30808413daSEnji Cooper
31808413daSEnji CooperThis release incorporates the following bug fixes and mitigations:
32808413daSEnji Cooper
33808413daSEnji Cooper  * Fixed Improper validation of PBMAC1 parameters in PKCS#12 MAC verification.
34808413daSEnji Cooper    ([CVE-2025-11187])
35808413daSEnji Cooper
36808413daSEnji Cooper  * Fixed Stack buffer overflow in CMS `AuthEnvelopedData` parsing.
37808413daSEnji Cooper    ([CVE-2025-15467])
38808413daSEnji Cooper
39808413daSEnji Cooper  * Fixed NULL dereference in `SSL_CIPHER_find()` function on unknown cipher ID.
40808413daSEnji Cooper    ([CVE-2025-15468])
41808413daSEnji Cooper
42808413daSEnji Cooper  * Fixed `openssl dgst` one-shot codepath silently truncates inputs >16 MiB.
43808413daSEnji Cooper    ([CVE-2025-15469])
44808413daSEnji Cooper
45808413daSEnji Cooper  * Fixed TLS 1.3 `CompressedCertificate` excessive memory allocation.
46808413daSEnji Cooper    ([CVE-2025-66199])
47808413daSEnji Cooper
48808413daSEnji Cooper  * Fixed Heap out-of-bounds write in `BIO_f_linebuffer` on short writes.
49808413daSEnji Cooper    ([CVE-2025-68160])
50808413daSEnji Cooper
51808413daSEnji Cooper  * Fixed Unauthenticated/unencrypted trailing bytes with low-level OCB
52808413daSEnji Cooper    function calls.
53808413daSEnji Cooper    ([CVE-2025-69418])
54808413daSEnji Cooper
55808413daSEnji Cooper  * Fixed Out of bounds write in `PKCS12_get_friendlyname()` UTF-8 conversion.
56808413daSEnji Cooper    ([CVE-2025-69419])
57808413daSEnji Cooper
58808413daSEnji Cooper  * Fixed Missing `ASN1_TYPE` validation in `TS_RESP_verify_response()`
59808413daSEnji Cooper    function.
60808413daSEnji Cooper    ([CVE-2025-69420])
61808413daSEnji Cooper
62808413daSEnji Cooper  * Fixed NULL Pointer Dereference in `PKCS12_item_decrypt_d2i_ex()` function.
63808413daSEnji Cooper    ([CVE-2025-69421])
64808413daSEnji Cooper
65808413daSEnji Cooper  * Fixed Missing `ASN1_TYPE` validation in PKCS#12 parsing.
66808413daSEnji Cooper    ([CVE-2026-22795])
67808413daSEnji Cooper
68808413daSEnji Cooper  * Fixed `ASN1_TYPE` Type Confusion in the `PKCS7_digest_from_attributes()`
69808413daSEnji Cooper    function.
70808413daSEnji Cooper    ([CVE-2026-22796])
71808413daSEnji Cooper
728e12a5c4SEnji Cooper### Major changes between OpenSSL 3.5.3 and OpenSSL 3.5.4 [30 Sep 2025]
738e12a5c4SEnji Cooper
748e12a5c4SEnji CooperOpenSSL 3.5.4 is a security patch release. The most severe CVE fixed in this
758e12a5c4SEnji Cooperrelease is Moderate.
768e12a5c4SEnji Cooper
778e12a5c4SEnji CooperThis release incorporates the following bug fixes and mitigations:
788e12a5c4SEnji Cooper
798e12a5c4SEnji Cooper  * Fix Out-of-bounds read & write in RFC 3211 KEK Unwrap.
808e12a5c4SEnji Cooper    ([CVE-2025-9230])
818e12a5c4SEnji Cooper
828e12a5c4SEnji Cooper  * Fix Timing side-channel in SM2 algorithm on 64 bit ARM.
838e12a5c4SEnji Cooper    ([CVE-2025-9231])
848e12a5c4SEnji Cooper
858e12a5c4SEnji Cooper  * Fix Out-of-bounds read in HTTP client no_proxy handling.
868e12a5c4SEnji Cooper    ([CVE-2025-9232])
878e12a5c4SEnji Cooper
888e12a5c4SEnji Cooper  * Reverted the synthesised `OPENSSL_VERSION_NUMBER` change for the release
898e12a5c4SEnji Cooper    builds, as it broke some exiting applications that relied on the previous
908e12a5c4SEnji Cooper    3.x semantics, as documented in `OpenSSL_version(3)`.
918e12a5c4SEnji Cooper
92aed904c4SEnji Cooper### Major changes between OpenSSL 3.5.2 and OpenSSL 3.5.3 [16 Sep 2025]
93aed904c4SEnji Cooper
948e12a5c4SEnji CooperOpenSSL 3.5.3 is a bug fix release.
958e12a5c4SEnji Cooper
968e12a5c4SEnji CooperThis release incorporates the following bug fixes and mitigations:
978e12a5c4SEnji Cooper
98aed904c4SEnji Cooper  * Added FIPS 140-3 PCT on DH key generation.
99aed904c4SEnji Cooper
100aed904c4SEnji Cooper  * Fixed the synthesised `OPENSSL_VERSION_NUMBER`.
101aed904c4SEnji Cooper
1028e12a5c4SEnji Cooper  * Removed PCT on key import in the FIPS provider as it is not required by
1038e12a5c4SEnji Cooper    the standard.
104aed904c4SEnji Cooper
105fbc35f82SEnji Cooper### Major changes between OpenSSL 3.5.1 and OpenSSL 3.5.2 [5 Aug 2025]
106fbc35f82SEnji Cooper
1078e12a5c4SEnji CooperOpenSSL 3.5.2 is a bug fix release.
1088e12a5c4SEnji Cooper
1098e12a5c4SEnji CooperThis release incorporates the following bug fixes and mitigations:
1108e12a5c4SEnji Cooper
1118e12a5c4SEnji Cooper  * The FIPS provider now performs a PCT on key import for RSA, EC and ECX.
112fbc35f82SEnji Cooper
1131095efe4SPierre Pronchery### Major changes between OpenSSL 3.5.0 and OpenSSL 3.5.1 [1 Jul 2025]
1141095efe4SPierre Pronchery
1151095efe4SPierre ProncheryOpenSSL 3.5.1 is a security patch release. The most severe CVE fixed in this
1161095efe4SPierre Proncheryrelease is Low.
1171095efe4SPierre Pronchery
1181095efe4SPierre ProncheryThis release incorporates the following bug fixes and mitigations:
1191095efe4SPierre Pronchery
1201095efe4SPierre Pronchery  * Fix x509 application adds trusted use instead of rejected use.
1211095efe4SPierre Pronchery    ([CVE-2025-4575])
1221095efe4SPierre Pronchery
12329536654SEnji Cooper### Major changes between OpenSSL 3.4 and OpenSSL 3.5.0 [8 Apr 2025]
1241c342803SEnji Cooper
12529536654SEnji CooperOpenSSL 3.5.0 is a feature release adding significant new functionality to
12629536654SEnji CooperOpenSSL.
12729536654SEnji Cooper
12829536654SEnji CooperThis release incorporates the following potentially significant or incompatible
12929536654SEnji Cooperchanges:
13029536654SEnji Cooper
13129536654SEnji Cooper  * Default encryption cipher for the `req`, `cms`, and `smime` applications
13229536654SEnji Cooper    changed from `des-ede3-cbc` to `aes-256-cbc`.
13329536654SEnji Cooper
13429536654SEnji Cooper  * The default TLS supported groups list has been changed to include and
13529536654SEnji Cooper    prefer hybrid PQC KEM groups. Some practically unused groups were removed
13629536654SEnji Cooper    from the default list.
13729536654SEnji Cooper
13829536654SEnji Cooper  * The default TLS keyshares have been changed to offer X25519MLKEM768 and
13929536654SEnji Cooper    and X25519.
14029536654SEnji Cooper
14129536654SEnji Cooper  * All `BIO_meth_get_*()` functions were deprecated.
14229536654SEnji Cooper
14329536654SEnji CooperThis release adds the following new features:
14429536654SEnji Cooper
14529536654SEnji Cooper  * Support for server side QUIC (RFC 9000)
14629536654SEnji Cooper
14729536654SEnji Cooper  * Support for 3rd party QUIC stacks including 0-RTT support
14829536654SEnji Cooper
14929536654SEnji Cooper  * Support for PQC algorithms (ML-KEM, ML-DSA and SLH-DSA)
15029536654SEnji Cooper
15129536654SEnji Cooper  * A new configuration option `no-tls-deprecated-ec` to disable support for
15229536654SEnji Cooper    TLS groups deprecated in RFC8422
15329536654SEnji Cooper
15429536654SEnji Cooper  * A new configuration option `enable-fips-jitter` to make the FIPS provider
15529536654SEnji Cooper    to use the `JITTER` seed source
15629536654SEnji Cooper
15729536654SEnji Cooper  * Support for central key generation in CMP
15829536654SEnji Cooper
15929536654SEnji Cooper  * Support added for opaque symmetric key objects (EVP_SKEY)
16029536654SEnji Cooper
16129536654SEnji Cooper  * Support for multiple TLS keyshares and improved TLS key establishment group
16229536654SEnji Cooper    configurability
16329536654SEnji Cooper
16429536654SEnji Cooper  * API support for pipelining in provided cipher algorithms
16529536654SEnji Cooper
16629536654SEnji CooperKnown issues in 3.5.0
16729536654SEnji Cooper
16829536654SEnji Cooper  * <https://github.com/openssl/openssl/issues/27282>
16929536654SEnji Cooper    Calling SSL_accept on objects returned from SSL_accept_connection
17029536654SEnji Cooper    results in error.  It is expected that making this call will advance
17129536654SEnji Cooper    the SSL handshake for the passed connection, but currently it does not.
17229536654SEnji Cooper    This can be handled by calling SSL_do_handshake instead.  A fix is planned
17329536654SEnji Cooper    for OpenSSL 3.5.1
17429536654SEnji Cooper
17529536654SEnji CooperOpenSSL 3.4
17629536654SEnji Cooper-----------
17729536654SEnji Cooper
17829536654SEnji Cooper### Major changes between OpenSSL 3.4.0 and OpenSSL 3.4.1 [11 Feb 2025]
17929536654SEnji Cooper
18029536654SEnji CooperOpenSSL 3.4.1 is a security patch release. The most severe CVE fixed in this
18129536654SEnji Cooperrelease is High.
1821c342803SEnji Cooper
1831c342803SEnji CooperThis release incorporates the following bug fixes and mitigations:
1841c342803SEnji Cooper
18529536654SEnji Cooper  * Fixed RFC7250 handshakes with unauthenticated servers don't abort as expected.
18629536654SEnji Cooper    ([CVE-2024-12797])
18729536654SEnji Cooper
1881c342803SEnji Cooper  * Fixed timing side-channel in ECDSA signature computation.
1891c342803SEnji Cooper    ([CVE-2024-13176])
1901c342803SEnji Cooper
19129536654SEnji Cooper### Major changes between OpenSSL 3.3 and OpenSSL 3.4.0 [22 Oct 2024]
19229536654SEnji Cooper
19329536654SEnji CooperOpenSSL 3.4.0 is a feature release adding significant new functionality to
19429536654SEnji CooperOpenSSL.
19529536654SEnji Cooper
19629536654SEnji CooperThis release incorporates the following potentially significant or incompatible
19729536654SEnji Cooperchanges:
19829536654SEnji Cooper
19929536654SEnji Cooper  * Deprecation of TS_VERIFY_CTX_set_* functions and addition of replacement
20029536654SEnji Cooper    TS_VERIFY_CTX_set0_* functions with improved semantics
20129536654SEnji Cooper
20229536654SEnji Cooper  * Redesigned use of OPENSSLDIR/ENGINESDIR/MODULESDIR on Windows such that
20329536654SEnji Cooper    what were formerly build time locations can now be defined at run time
20429536654SEnji Cooper    with registry keys
20529536654SEnji Cooper
20629536654SEnji Cooper  * The X25519 and X448 key exchange implementation in the FIPS provider
20729536654SEnji Cooper    is unapproved and has `fips=no` property.
20829536654SEnji Cooper
20929536654SEnji Cooper  * SHAKE-128 and SHAKE-256 implementations have no default digest length
21029536654SEnji Cooper    anymore. That means these algorithms cannot be used with
21129536654SEnji Cooper    EVP_DigestFinal/_ex() unless the `xoflen` param is set before.
21229536654SEnji Cooper
21329536654SEnji Cooper  * Setting `config_diagnostics=1` in the config file will cause errors to
21429536654SEnji Cooper    be returned from SSL_CTX_new() and SSL_CTX_new_ex() if there is an error
21529536654SEnji Cooper    in the ssl module configuration.
21629536654SEnji Cooper
21729536654SEnji Cooper  * An empty renegotiate extension will be used in TLS client hellos instead
21829536654SEnji Cooper    of the empty renegotiation SCSV, for all connections with a minimum TLS
21929536654SEnji Cooper    version > 1.0.
22029536654SEnji Cooper
22129536654SEnji Cooper  * Deprecation of SSL_SESSION_get_time(), SSL_SESSION_set_time() and
22229536654SEnji Cooper    SSL_CTX_flush_sessions() functions in favor of their respective `_ex`
22329536654SEnji Cooper    functions which are Y2038-safe on platforms with Y2038-safe `time_t`
22429536654SEnji Cooper
22529536654SEnji CooperThis release adds the following new features:
22629536654SEnji Cooper
22729536654SEnji Cooper  * Support for directly fetched composite signature algorithms such as
22829536654SEnji Cooper    RSA-SHA2-256 including new API functions
22929536654SEnji Cooper
23029536654SEnji Cooper  * FIPS indicators support in the FIPS provider and various updates of the FIPS
23129536654SEnji Cooper    provider required for future FIPS 140-3 validations
23229536654SEnji Cooper
23329536654SEnji Cooper  * Implementation of RFC 9579 (PBMAC1) in PKCS#12
23429536654SEnji Cooper
23529536654SEnji Cooper  * An optional additional random seed source RNG `JITTER` using a statically
23629536654SEnji Cooper    linked jitterentropy library
23729536654SEnji Cooper
23829536654SEnji Cooper  * New options `-not_before` and `-not_after` for explicit setting start and
23929536654SEnji Cooper    end dates of certificates created with the `req` and `x509` apps
24029536654SEnji Cooper
24129536654SEnji Cooper  * Support for integrity-only cipher suites TLS_SHA256_SHA256 and
24229536654SEnji Cooper    TLS_SHA384_SHA384 in TLS 1.3, as defined in RFC 9150
24329536654SEnji Cooper
24429536654SEnji Cooper  * Support for retrieving certificate request templates and CRLs in CMP
24529536654SEnji Cooper
24629536654SEnji Cooper  * Support for additional X.509v3 extensions related to Attribute Certificates
24729536654SEnji Cooper
24829536654SEnji Cooper  * Initial Attribute Certificate (RFC 5755) support
24929536654SEnji Cooper
25029536654SEnji Cooper  * Possibility to customize ECC groups initialization to use precomputed values
25129536654SEnji Cooper    to save CPU time and use of this feature by the P-256 implementation
25229536654SEnji Cooper
25329536654SEnji CooperOpenSSL 3.3
25429536654SEnji Cooper-----------
25529536654SEnji Cooper
25629536654SEnji Cooper### Major changes between OpenSSL 3.3.2 and OpenSSL 3.3.3 [under development]
25729536654SEnji Cooper
25829536654SEnji CooperOpenSSL 3.3.3 is a security patch release. The most severe CVE fixed in this
25929536654SEnji Cooperrelease is Low.
26029536654SEnji Cooper
26129536654SEnji CooperThis release incorporates the following bug fixes and mitigations:
26229536654SEnji Cooper
2631c342803SEnji Cooper  * Fixed possible OOB memory access with invalid low-level GF(2^m) elliptic
2641c342803SEnji Cooper    curve parameters.
2651c342803SEnji Cooper    ([CVE-2024-9143])
2661c342803SEnji Cooper
26729536654SEnji Cooper### Major changes between OpenSSL 3.3.1 and OpenSSL 3.3.2 [3 Sep 2024]
268108164cfSGordon Tetlow
26929536654SEnji CooperOpenSSL 3.3.2 is a security patch release. The most severe CVE fixed in this
270108164cfSGordon Tetlowrelease is Moderate.
271108164cfSGordon Tetlow
272108164cfSGordon TetlowThis release incorporates the following bug fixes and mitigations:
273108164cfSGordon Tetlow
274108164cfSGordon Tetlow  * Fixed possible denial of service in X.509 name checks
275108164cfSGordon Tetlow    ([CVE-2024-6119])
276108164cfSGordon Tetlow
277108164cfSGordon Tetlow  * Fixed possible buffer overread in SSL_select_next_proto()
278108164cfSGordon Tetlow    ([CVE-2024-5535])
279108164cfSGordon Tetlow
28029536654SEnji Cooper### Major changes between OpenSSL 3.3.0 and OpenSSL 3.3.1 [4 Jun 2024]
28129536654SEnji Cooper
28229536654SEnji CooperOpenSSL 3.3.1 is a security patch release. The most severe CVE fixed in this
28329536654SEnji Cooperrelease is Low.
28429536654SEnji Cooper
28529536654SEnji CooperThis release incorporates the following bug fixes and mitigations:
2861070e7dcSEnji Cooper
2871070e7dcSEnji Cooper  * Fixed potential use after free after SSL_free_buffers() is called
2881070e7dcSEnji Cooper    ([CVE-2024-4741])
2891070e7dcSEnji Cooper
2901070e7dcSEnji Cooper  * Fixed an issue where checking excessively long DSA keys or parameters may
2911070e7dcSEnji Cooper    be very slow
2921070e7dcSEnji Cooper    ([CVE-2024-4603])
2931070e7dcSEnji Cooper
29429536654SEnji Cooper### Major changes between OpenSSL 3.2 and OpenSSL 3.3.0 [9 Apr 2024]
29529536654SEnji Cooper
29629536654SEnji CooperOpenSSL 3.3.0 is a feature release adding significant new functionality to
29729536654SEnji CooperOpenSSL.
29829536654SEnji Cooper
29929536654SEnji CooperThis release adds the following new features:
30029536654SEnji Cooper
30129536654SEnji Cooper  * Support for qlog for tracing QUIC connections has been added
30229536654SEnji Cooper
30329536654SEnji Cooper  * Added APIs to allow configuring the negotiated idle timeout for QUIC
30429536654SEnji Cooper    connections, and to allow determining the number of additional streams
30529536654SEnji Cooper    that can currently be created for a QUIC connection.
30629536654SEnji Cooper
30729536654SEnji Cooper  * Added APIs to allow disabling implicit QUIC event processing for QUIC SSL
30829536654SEnji Cooper    objects
30929536654SEnji Cooper
31029536654SEnji Cooper  * Added APIs to allow querying the size and utilisation of a QUIC stream's
31129536654SEnji Cooper    write buffer
31229536654SEnji Cooper
31329536654SEnji Cooper  * New API `SSL_write_ex2`, which can be used to send an end-of-stream (FIN)
31429536654SEnji Cooper    condition in an optimised way when using QUIC.
31529536654SEnji Cooper
31629536654SEnji Cooper  * Limited support for polling of QUIC connection and stream objects in a
31729536654SEnji Cooper    non-blocking manner.
31829536654SEnji Cooper
31929536654SEnji Cooper  * Added a new EVP_DigestSqueeze() API. This allows SHAKE to squeeze multiple
32029536654SEnji Cooper    times with different output sizes.
32129536654SEnji Cooper
32229536654SEnji Cooper  * Added exporter for CMake on Unix and Windows, alongside the pkg-config
32329536654SEnji Cooper    exporter.
32429536654SEnji Cooper
32529536654SEnji Cooper  * The BLAKE2s hash algorithm matches BLAKE2b's support for configurable
32629536654SEnji Cooper    output length.
32729536654SEnji Cooper
32829536654SEnji Cooper  * The EVP_PKEY_fromdata function has been augmented to allow for the
32929536654SEnji Cooper    derivation of CRT (Chinese Remainder Theorem) parameters when requested
33029536654SEnji Cooper
33129536654SEnji Cooper  * Added API functions SSL_SESSION_get_time_ex(), SSL_SESSION_set_time_ex()
33229536654SEnji Cooper    using time_t which is Y2038 safe on 32 bit systems when 64 bit time
33329536654SEnji Cooper    is enabled
33429536654SEnji Cooper
33529536654SEnji Cooper  * Unknown entries in TLS SignatureAlgorithms, ClientSignatureAlgorithms
33629536654SEnji Cooper    config options and the respective calls to SSL[_CTX]_set1_sigalgs() and
33729536654SEnji Cooper    SSL[_CTX]_set1_client_sigalgs() that start with `?` character are
33829536654SEnji Cooper    ignored and the configuration will still be used.
33929536654SEnji Cooper
34029536654SEnji Cooper  * Added `-set_issuer` and `-set_subject` options to `openssl x509` to
34129536654SEnji Cooper    override the Issuer and Subject when creating a certificate. The `-subj`
34229536654SEnji Cooper    option now is an alias for `-set_subject`.
34329536654SEnji Cooper
34429536654SEnji Cooper  * Added several new features of CMPv3 defined in RFC 9480 and RFC 9483
34529536654SEnji Cooper
34629536654SEnji Cooper  * New option `SSL_OP_PREFER_NO_DHE_KEX`, which allows configuring a TLS1.3
34729536654SEnji Cooper    server to prefer session resumption using PSK-only key exchange over PSK
34829536654SEnji Cooper    with DHE, if both are available.
34929536654SEnji Cooper
35029536654SEnji Cooper  * New atexit configuration switch, which controls whether the OPENSSL_cleanup
35129536654SEnji Cooper    is registered when libcrypto is unloaded.
35229536654SEnji Cooper
35329536654SEnji Cooper  * Added X509_STORE_get1_objects to avoid issues with the existing
35429536654SEnji Cooper    X509_STORE_get0_objects API in multi-threaded applications.
35529536654SEnji Cooper
356808413daSEnji Cooper  * Support for using certificate profiles and extended delayed delivery in CMP
35729536654SEnji Cooper
35829536654SEnji CooperThis release incorporates the following potentially significant or incompatible
35929536654SEnji Cooperchanges:
36029536654SEnji Cooper
36129536654SEnji Cooper  * Applied AES-GCM unroll8 optimisation to Microsoft Azure Cobalt 100
36229536654SEnji Cooper
36329536654SEnji Cooper  * Optimized AES-CTR for ARM Neoverse V1 and V2
36429536654SEnji Cooper
36529536654SEnji Cooper  * Enable AES and SHA3 optimisations on Apple Silicon M3-based MacOS systems
36629536654SEnji Cooper    similar to M1/M2.
36729536654SEnji Cooper
36829536654SEnji Cooper  * Various optimizations for cryptographic routines using RISC-V vector crypto
36929536654SEnji Cooper    extensions
37029536654SEnji Cooper
37129536654SEnji Cooper  * Added assembly implementation for md5 on loongarch64
37229536654SEnji Cooper
37329536654SEnji Cooper  * Accept longer context for TLS 1.2 exporters
37429536654SEnji Cooper
37529536654SEnji Cooper  * The activate and soft_load configuration settings for providers in
37629536654SEnji Cooper    openssl.cnf have been updated to require a value of [1|yes|true|on]
37729536654SEnji Cooper    (in lower or UPPER case) to enable the setting. Conversely a value
37829536654SEnji Cooper    of [0|no|false|off] will disable the setting.
37929536654SEnji Cooper
38029536654SEnji Cooper  * In `openssl speed`, changed the default hash function used with `hmac` from
38129536654SEnji Cooper    `md5` to `sha256`.
38229536654SEnji Cooper
38329536654SEnji Cooper  * The `-verify` option to the `openssl crl` and `openssl req` will make the
38429536654SEnji Cooper    program exit with 1 on failure.
38529536654SEnji Cooper
38629536654SEnji Cooper  * The d2i_ASN1_GENERALIZEDTIME(), d2i_ASN1_UTCTIME(), ASN1_TIME_check(), and
38729536654SEnji Cooper    related functions have been augmented to check for a minimum length of
38829536654SEnji Cooper    the input string, in accordance with ITU-T X.690 section 11.7 and 11.8.
38929536654SEnji Cooper
39029536654SEnji Cooper  * OPENSSL_sk_push() and sk_<TYPE>_push() functions now return 0 instead of -1
39129536654SEnji Cooper    if called with a NULL stack argument.
39229536654SEnji Cooper
39329536654SEnji Cooper  * New limit on HTTP response headers is introduced to HTTP client. The
39429536654SEnji Cooper    default limit is set to 256 header lines.
39529536654SEnji Cooper
39629536654SEnji CooperThis release incorporates the following bug fixes and mitigations:
39729536654SEnji Cooper
39829536654SEnji Cooper  * The BIO_get_new_index() function can only be called 127 times before it
39929536654SEnji Cooper    reaches its upper bound of BIO_TYPE_MASK and will now return -1 once its
40029536654SEnji Cooper    exhausted.
40129536654SEnji Cooper
40229536654SEnji CooperA more detailed list of changes in this release can be found in the
40329536654SEnji Cooper[CHANGES.md] file.
40429536654SEnji Cooper
40529536654SEnji CooperUsers interested in using the new QUIC functionality are encouraged to read the
40629536654SEnji Cooper[README file for QUIC][README-QUIC.md], which provides links to relevant
40729536654SEnji Cooperdocumentation and example code.
40829536654SEnji Cooper
40929536654SEnji CooperAs always, bug reports and issues relating to OpenSSL can be [filed on our issue
41029536654SEnji Coopertracker][issue tracker].
41129536654SEnji Cooper
41229536654SEnji CooperOpenSSL 3.2
41329536654SEnji Cooper-----------
41429536654SEnji Cooper
41529536654SEnji Cooper### Major changes between OpenSSL 3.2.1 and OpenSSL 3.2.2 [under development]
41629536654SEnji Cooper
41729536654SEnji CooperOpenSSL 3.2.2 is a security patch release. The most severe CVE fixed in this
41829536654SEnji Cooperrelease is Low.
41929536654SEnji Cooper
42029536654SEnji CooperThis release incorporates the following bug fixes and mitigations:
42129536654SEnji Cooper
4221070e7dcSEnji Cooper  * Fixed unbounded memory growth with session handling in TLSv1.3
4231070e7dcSEnji Cooper    ([CVE-2024-2511])
4241070e7dcSEnji Cooper
42529536654SEnji Cooper### Major changes between OpenSSL 3.2.0 and OpenSSL 3.2.1 [30 Jan 2024]
42629536654SEnji Cooper
42729536654SEnji CooperOpenSSL 3.2.1 is a security patch release. The most severe CVE fixed in this
42829536654SEnji Cooperrelease is Low.
42929536654SEnji Cooper
43029536654SEnji CooperThis release incorporates the following bug fixes and mitigations:
4319dd13e84SCy Schubert
4329dd13e84SCy Schubert  * Fixed PKCS12 Decoding crashes
4339dd13e84SCy Schubert    ([CVE-2024-0727])
43429536654SEnji Cooper
43529536654SEnji Cooper  * Fixed excessive time spent checking invalid RSA public keys
4369dd13e84SCy Schubert    ([CVE-2023-6237])
43729536654SEnji Cooper
4389dd13e84SCy Schubert  * Fixed POLY1305 MAC implementation corrupting vector registers on PowerPC
4399dd13e84SCy Schubert    CPUs which support PowerISA 2.07
4409dd13e84SCy Schubert    ([CVE-2023-6129])
4419dd13e84SCy Schubert
44229536654SEnji Cooper### Major changes between OpenSSL 3.1 and OpenSSL 3.2.0 [23 Nov 2023]
44329536654SEnji Cooper
44429536654SEnji CooperOpenSSL 3.2.0 is a feature release adding significant new functionality to
44529536654SEnji CooperOpenSSL.
44629536654SEnji Cooper
44729536654SEnji CooperThis release incorporates the following potentially significant or incompatible
44829536654SEnji Cooperchanges:
44929536654SEnji Cooper
45029536654SEnji Cooper  * The default SSL/TLS security level has been changed from 1 to 2.
45129536654SEnji Cooper
45229536654SEnji Cooper  * The `x509`, `ca`, and `req` apps now always produce X.509v3 certificates.
45329536654SEnji Cooper
45429536654SEnji Cooper  * Subject or issuer names in X.509 objects are now displayed as UTF-8 strings
45529536654SEnji Cooper    by default. Also spaces surrounding `=` in DN output are removed.
45629536654SEnji Cooper
45729536654SEnji CooperThis release adds the following new features:
45829536654SEnji Cooper
45929536654SEnji Cooper  * Support for client side QUIC, including support for
46029536654SEnji Cooper    multiple streams (RFC 9000)
46129536654SEnji Cooper
46229536654SEnji Cooper  * Support for Ed25519ctx, Ed25519ph and Ed448ph in addition
46329536654SEnji Cooper    to existing support for Ed25519 and Ed448 (RFC 8032)
46429536654SEnji Cooper
46529536654SEnji Cooper  * Support for deterministic ECDSA signatures (RFC 6979)
46629536654SEnji Cooper
46729536654SEnji Cooper  * Support for AES-GCM-SIV, a nonce-misuse-resistant AEAD (RFC 8452)
46829536654SEnji Cooper
46929536654SEnji Cooper  * Support for the Argon2 KDF, along with supporting thread pool
47029536654SEnji Cooper    functionality (RFC 9106)
47129536654SEnji Cooper
47229536654SEnji Cooper  * Support for Hybrid Public Key Encryption (HPKE) (RFC 9180)
47329536654SEnji Cooper
47429536654SEnji Cooper  * Support for SM4-XTS
47529536654SEnji Cooper
47629536654SEnji Cooper  * Support for Brainpool curves in TLS 1.3
47729536654SEnji Cooper
47829536654SEnji Cooper  * Support for TLS Raw Public Keys (RFC 7250)
47929536654SEnji Cooper
48029536654SEnji Cooper  * Support for TCP Fast Open on Linux, macOS and FreeBSD,
48129536654SEnji Cooper    where enabled and supported (RFC 7413)
48229536654SEnji Cooper
48329536654SEnji Cooper  * Support for TLS certificate compression, including library
48429536654SEnji Cooper    support for zlib, Brotli and zstd (RFC 8879)
48529536654SEnji Cooper
48629536654SEnji Cooper  * Support for provider-based pluggable signature algorithms
48729536654SEnji Cooper    in TLS 1.3 with supporting CMS and X.509 functionality
48829536654SEnji Cooper
48929536654SEnji Cooper    With a suitable provider this enables the use of post-quantum/quantum-safe
49029536654SEnji Cooper    cryptography.
49129536654SEnji Cooper
49229536654SEnji Cooper  * Support for using the Windows system certificate store as a source of
49329536654SEnji Cooper    trusted root certificates
49429536654SEnji Cooper
49529536654SEnji Cooper    This is not yet enabled by default and must be activated using an
49629536654SEnji Cooper    environment variable. This is likely to become enabled by default
49729536654SEnji Cooper    in a future feature release.
49829536654SEnji Cooper
49929536654SEnji Cooper  * Support for using the IANA standard names in TLS ciphersuite configuration
50029536654SEnji Cooper
50129536654SEnji Cooper  * Multiple new features and improvements to CMP protocol support
50229536654SEnji Cooper
50329536654SEnji CooperThe following known issues are present in this release and will be rectified
50429536654SEnji Cooperin a future release:
50529536654SEnji Cooper
50629536654SEnji Cooper  * Provider-based signature algorithms cannot be configured using the
50729536654SEnji Cooper    SignatureAlgorithms configuration file parameter (#22761)
50829536654SEnji Cooper
50929536654SEnji CooperThis release incorporates the following documentation enhancements:
51029536654SEnji Cooper
51129536654SEnji Cooper  * Added multiple tutorials on the OpenSSL library and in particular
51229536654SEnji Cooper    on writing various clients (using TLS and QUIC protocols) with libssl
51329536654SEnji Cooper
51429536654SEnji Cooper    See [OpenSSL Guide].
51529536654SEnji Cooper
51629536654SEnji CooperThis release incorporates the following bug fixes and mitigations:
51729536654SEnji Cooper
51829536654SEnji Cooper  * Fixed excessive time spent in DH check / generation with large Q parameter
51929536654SEnji Cooper    value
52029536654SEnji Cooper    ([CVE-2023-5678])
52129536654SEnji Cooper
52229536654SEnji CooperA more detailed list of changes in this release can be found in the
52329536654SEnji Cooper[CHANGES.md] file.
52429536654SEnji Cooper
52529536654SEnji CooperUsers interested in using the new QUIC functionality are encouraged to read the
52629536654SEnji Cooper[README file for QUIC][README-QUIC.md], which provides links to relevant
52729536654SEnji Cooperdocumentation and example code.
52829536654SEnji Cooper
52929536654SEnji CooperAs always, bug reports and issues relating to OpenSSL can be [filed on our issue
53029536654SEnji Coopertracker][issue tracker].
53129536654SEnji Cooper
53229536654SEnji CooperOpenSSL 3.1
53329536654SEnji Cooper-----------
53429536654SEnji Cooper
53529536654SEnji Cooper### Major changes between OpenSSL 3.1.3 and OpenSSL 3.1.4 [24 Oct 2023]
536825caf7eSEd Maste
537825caf7eSEd Maste  * Mitigate incorrect resize handling for symmetric cipher keys and IVs.
538825caf7eSEd Maste    ([CVE-2023-5363])
539825caf7eSEd Maste
54029536654SEnji Cooper### Major changes between OpenSSL 3.1.2 and OpenSSL 3.1.3 [19 Sep 2023]
541315108b8SPierre Pronchery
542315108b8SPierre Pronchery  * Fix POLY1305 MAC implementation corrupting XMM registers on Windows
543315108b8SPierre Pronchery    ([CVE-2023-4807])
544315108b8SPierre Pronchery
54529536654SEnji Cooper### Major changes between OpenSSL 3.1.1 and OpenSSL 3.1.2 [1 Aug 2023]
546cf2fc1b0SPierre Pronchery
547cf2fc1b0SPierre Pronchery  * Fix excessive time spent checking DH q parameter value ([CVE-2023-3817])
548cf2fc1b0SPierre Pronchery  * Fix DH_check() excessive time with over sized modulus ([CVE-2023-3446])
549cf2fc1b0SPierre Pronchery  * Do not ignore empty associated data entries with AES-SIV ([CVE-2023-2975])
55029536654SEnji Cooper  * When building with the `enable-fips` option and using the resulting
55129536654SEnji Cooper    FIPS provider, TLS 1.2 will, by default, mandate the use of an
55229536654SEnji Cooper    extended master secret and the Hash and HMAC DRBGs will not operate
55329536654SEnji Cooper    with truncated digests.
554cf2fc1b0SPierre Pronchery
55529536654SEnji Cooper### Major changes between OpenSSL 3.1.0 and OpenSSL 3.1.1 [30 May 2023]
556b84c4564SPierre Pronchery
557b84c4564SPierre Pronchery  * Mitigate for very slow `OBJ_obj2txt()` performance with gigantic OBJECT
558b84c4564SPierre Pronchery    IDENTIFIER sub-identities.  ([CVE-2023-2650])
559b84c4564SPierre Pronchery  * Fixed buffer overread in AES-XTS decryption on ARM 64 bit platforms
560b84c4564SPierre Pronchery    ([CVE-2023-1255])
561b84c4564SPierre Pronchery  * Fixed documentation of X509_VERIFY_PARAM_add0_policy() ([CVE-2023-0466])
562b84c4564SPierre Pronchery  * Fixed handling of invalid certificate policies in leaf certificates
563b84c4564SPierre Pronchery    ([CVE-2023-0465])
564b84c4564SPierre Pronchery  * Limited the number of nodes created in a policy tree ([CVE-2023-0464])
565b84c4564SPierre Pronchery
56629536654SEnji Cooper### Major changes between OpenSSL 3.0 and OpenSSL 3.1.0 [14 Mar 2023]
56729536654SEnji Cooper
56829536654SEnji Cooper  * SSL 3, TLS 1.0, TLS 1.1, and DTLS 1.0 only work at security level 0.
56929536654SEnji Cooper  * Performance enhancements and new platform support including new
57029536654SEnji Cooper    assembler code algorithm implementations.
57129536654SEnji Cooper  * Deprecated LHASH statistics functions.
57229536654SEnji Cooper  * FIPS 140-3 compliance changes.
57329536654SEnji Cooper
57429536654SEnji CooperOpenSSL 3.0
57529536654SEnji Cooper-----------
57629536654SEnji Cooper
577e4520c8bSEnji Cooper### Major changes between OpenSSL 3.0.7 and OpenSSL 3.0.8 [7 Feb 2023]
578e4520c8bSEnji Cooper
579e4520c8bSEnji Cooper  * Fixed NULL dereference during PKCS7 data verification ([CVE-2023-0401])
580e4520c8bSEnji Cooper  * Fixed X.400 address type confusion in X.509 GeneralName ([CVE-2023-0286])
581e4520c8bSEnji Cooper  * Fixed NULL dereference validating DSA public key ([CVE-2023-0217])
582e4520c8bSEnji Cooper  * Fixed Invalid pointer dereference in d2i_PKCS7 functions ([CVE-2023-0216])
583e4520c8bSEnji Cooper  * Fixed Use-after-free following BIO_new_NDEF ([CVE-2023-0215])
584e4520c8bSEnji Cooper  * Fixed Double free after calling PEM_read_bio_ex ([CVE-2022-4450])
585e4520c8bSEnji Cooper  * Fixed Timing Oracle in RSA Decryption ([CVE-2022-4304])
586e4520c8bSEnji Cooper  * Fixed X.509 Name Constraints Read Buffer Overflow ([CVE-2022-4203])
587e4520c8bSEnji Cooper  * Fixed X.509 Policy Constraints Double Locking ([CVE-2022-3996])
588e4520c8bSEnji Cooper
589e4520c8bSEnji Cooper### Major changes between OpenSSL 3.0.6 and OpenSSL 3.0.7 [1 Nov 2022]
590e4520c8bSEnji Cooper
591e4520c8bSEnji Cooper  * Added RIPEMD160 to the default provider.
592e4520c8bSEnji Cooper  * Fixed regressions introduced in 3.0.6 version.
593e4520c8bSEnji Cooper  * Fixed two buffer overflows in punycode decoding functions.
594e4520c8bSEnji Cooper    ([CVE-2022-3786]) and ([CVE-2022-3602])
595e4520c8bSEnji Cooper
596e4520c8bSEnji Cooper### Major changes between OpenSSL 3.0.5 and OpenSSL 3.0.6 [11 Oct 2022]
597e4520c8bSEnji Cooper
598e4520c8bSEnji Cooper  * Fix for custom ciphers to prevent accidental use of NULL encryption
599e4520c8bSEnji Cooper    ([CVE-2022-3358])
600e4520c8bSEnji Cooper
601e4520c8bSEnji Cooper### Major changes between OpenSSL 3.0.4 and OpenSSL 3.0.5 [5 Jul 2022]
602e4520c8bSEnji Cooper
603e4520c8bSEnji Cooper  * Fixed heap memory corruption with RSA private key operation
604e4520c8bSEnji Cooper    ([CVE-2022-2274])
605e4520c8bSEnji Cooper  * Fixed AES OCB failure to encrypt some bytes on 32-bit x86 platforms
606e4520c8bSEnji Cooper    ([CVE-2022-2097])
607e4520c8bSEnji Cooper
608e4520c8bSEnji Cooper### Major changes between OpenSSL 3.0.3 and OpenSSL 3.0.4 [21 Jun 2022]
609e4520c8bSEnji Cooper
610e4520c8bSEnji Cooper  * Fixed additional bugs in the c_rehash script which was not properly
611e4520c8bSEnji Cooper    sanitising shell metacharacters to prevent command injection
612e4520c8bSEnji Cooper    ([CVE-2022-2068])
613e4520c8bSEnji Cooper
614e4520c8bSEnji Cooper### Major changes between OpenSSL 3.0.2 and OpenSSL 3.0.3 [3 May 2022]
615e4520c8bSEnji Cooper
616e4520c8bSEnji Cooper  * Fixed a bug in the c_rehash script which was not properly sanitising shell
617e4520c8bSEnji Cooper    metacharacters to prevent command injection ([CVE-2022-1292])
618e4520c8bSEnji Cooper  * Fixed a bug in the function `OCSP_basic_verify` that verifies the signer
619e4520c8bSEnji Cooper    certificate on an OCSP response ([CVE-2022-1343])
620e4520c8bSEnji Cooper  * Fixed a bug where the RC4-MD5 ciphersuite incorrectly used the
621e4520c8bSEnji Cooper    AAD data as the MAC key ([CVE-2022-1434])
622e4520c8bSEnji Cooper  * Fix a bug in the OPENSSL_LH_flush() function that breaks reuse of the memory
62329536654SEnji Cooper    occupied by the removed hash table entries ([CVE-2022-1473])
624e4520c8bSEnji Cooper
625e4520c8bSEnji Cooper### Major changes between OpenSSL 3.0.1 and OpenSSL 3.0.2 [15 Mar 2022]
626e4520c8bSEnji Cooper
627e4520c8bSEnji Cooper  * Fixed a bug in the BN_mod_sqrt() function that can cause it to loop forever
628e4520c8bSEnji Cooper    for non-prime moduli ([CVE-2022-0778])
629e4520c8bSEnji Cooper
630e4520c8bSEnji Cooper### Major changes between OpenSSL 3.0.0 and OpenSSL 3.0.1 [14 Dec 2021]
631e4520c8bSEnji Cooper
632808413daSEnji Cooper  * Fixed carry bug in BN_mod_exp which may produce incorrect results on MIPS
633808413daSEnji Cooper    ([CVE-2021-4160])
634e4520c8bSEnji Cooper  * Fixed invalid handling of X509_verify_cert() internal errors in libssl
635e4520c8bSEnji Cooper    ([CVE-2021-4044])
636e4520c8bSEnji Cooper  * Allow fetching an operation from the provider that owns an unexportable key
637e4520c8bSEnji Cooper    as a fallback if that is still allowed by the property query.
638e4520c8bSEnji Cooper
639e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1 and OpenSSL 3.0.0 [7 sep 2021]
640e4520c8bSEnji Cooper
641e4520c8bSEnji Cooper  * Enhanced 'openssl list' with many new options.
642e4520c8bSEnji Cooper  * Added migration guide to man7.
643e4520c8bSEnji Cooper  * Implemented support for fully "pluggable" TLSv1.3 groups.
64429536654SEnji Cooper  * Added support for Kernel TLS (KTLS).
645e4520c8bSEnji Cooper  * Changed the license to the Apache License v2.0.
646e4520c8bSEnji Cooper  * Moved all variations of the EVP ciphers CAST5, BF, IDEA, SEED, RC2,
647e4520c8bSEnji Cooper    RC4, RC5, and DES to the legacy provider.
648e4520c8bSEnji Cooper  * Moved the EVP digests MD2, MD4, MDC2, WHIRLPOOL and RIPEMD-160 to the legacy
649e4520c8bSEnji Cooper    provider.
650e4520c8bSEnji Cooper  * Added convenience functions for generating asymmetric key pairs.
651e4520c8bSEnji Cooper  * Deprecated the `OCSP_REQ_CTX` type and functions.
652e4520c8bSEnji Cooper  * Deprecated the `EC_KEY` and `EC_KEY_METHOD` types and functions.
653e4520c8bSEnji Cooper  * Deprecated the `RSA` and `RSA_METHOD` types and functions.
654e4520c8bSEnji Cooper  * Deprecated the `DSA` and `DSA_METHOD` types and functions.
655e4520c8bSEnji Cooper  * Deprecated the `DH` and `DH_METHOD` types and functions.
656e4520c8bSEnji Cooper  * Deprecated the `ERR_load_` functions.
657e4520c8bSEnji Cooper  * Remove the `RAND_DRBG` API.
658e4520c8bSEnji Cooper  * Deprecated the `ENGINE` API.
659e4520c8bSEnji Cooper  * Added `OSSL_LIB_CTX`, a libcrypto library context.
660e4520c8bSEnji Cooper  * Added various `_ex` functions to the OpenSSL API that support using
661e4520c8bSEnji Cooper    a non-default `OSSL_LIB_CTX`.
662e4520c8bSEnji Cooper  * Interactive mode is removed from the 'openssl' program.
663e4520c8bSEnji Cooper  * The X25519, X448, Ed25519, Ed448, SHAKE128 and SHAKE256 algorithms are
664e4520c8bSEnji Cooper    included in the FIPS provider.
665e4520c8bSEnji Cooper  * X509 certificates signed using SHA1 are no longer allowed at security
666e4520c8bSEnji Cooper    level 1 or higher. The default security level for TLS is 1, so
667e4520c8bSEnji Cooper    certificates signed using SHA1 are by default no longer trusted to
668e4520c8bSEnji Cooper    authenticate servers or clients.
669e4520c8bSEnji Cooper  * enable-crypto-mdebug and enable-crypto-mdebug-backtrace were mostly
670e4520c8bSEnji Cooper    disabled; the project uses address sanitize/leak-detect instead.
671e4520c8bSEnji Cooper  * Added a Certificate Management Protocol (CMP, RFC 4210) implementation
672e4520c8bSEnji Cooper    also covering CRMF (RFC 4211) and HTTP transfer (RFC 6712).
673e4520c8bSEnji Cooper    It is part of the crypto lib and adds a 'cmp' app with a demo configuration.
674e4520c8bSEnji Cooper    All widely used CMP features are supported for both clients and servers.
675e4520c8bSEnji Cooper  * Added a proper HTTP client supporting GET with optional redirection, POST,
676e4520c8bSEnji Cooper    arbitrary request and response content types, TLS, persistent connections,
677e4520c8bSEnji Cooper    connections via HTTP(s) proxies, connections and exchange via user-defined
678e4520c8bSEnji Cooper    BIOs (allowing implicit connections), and timeout checks.
679e4520c8bSEnji Cooper  * Added util/check-format.pl for checking adherence to the coding guidelines.
680e4520c8bSEnji Cooper  * Added OSSL_ENCODER, a generic encoder API.
681e4520c8bSEnji Cooper  * Added OSSL_DECODER, a generic decoder API.
682e4520c8bSEnji Cooper  * Added OSSL_PARAM_BLD, an easier to use API to OSSL_PARAM.
683e4520c8bSEnji Cooper  * Added error raising macros, ERR_raise() and ERR_raise_data().
684e4520c8bSEnji Cooper  * Deprecated ERR_put_error(), ERR_get_error_line(), ERR_get_error_line_data(),
685e4520c8bSEnji Cooper    ERR_peek_error_line_data(), ERR_peek_last_error_line_data() and
686e4520c8bSEnji Cooper    ERR_func_error_string().
68729536654SEnji Cooper  * Added OSSL_PROVIDER_available(), to check provider availability.
688e4520c8bSEnji Cooper  * Added 'openssl mac' that uses the EVP_MAC API.
689e4520c8bSEnji Cooper  * Added 'openssl kdf' that uses the EVP_KDF API.
690e4520c8bSEnji Cooper  * Add OPENSSL_info() and 'openssl info' to get built-in data.
691e4520c8bSEnji Cooper  * Add support for enabling instrumentation through trace and debug
692e4520c8bSEnji Cooper    output.
693e4520c8bSEnji Cooper  * Changed our version number scheme and set the next major release to
694e4520c8bSEnji Cooper    3.0.0
695e4520c8bSEnji Cooper  * Added EVP_MAC, an EVP layer MAC API, and a generic EVP_PKEY to EVP_MAC
696e4520c8bSEnji Cooper    bridge.  Supported MACs are: BLAKE2, CMAC, GMAC, HMAC, KMAC, POLY1305
697e4520c8bSEnji Cooper    and SIPHASH.
698e4520c8bSEnji Cooper  * Removed the heartbeat message in DTLS feature.
699e4520c8bSEnji Cooper  * Added EVP_KDF, an EVP layer KDF and PRF API, and a generic EVP_PKEY to
700e4520c8bSEnji Cooper    EVP_KDF bridge.  Supported KDFs are: HKDF, KBKDF, KRB5 KDF, PBKDF2,
701e4520c8bSEnji Cooper    PKCS12 KDF, SCRYPT, SSH KDF, SSKDF, TLS1 PRF, X9.42 KDF and X9.63 KDF.
702e4520c8bSEnji Cooper  * All of the low-level MD2, MD4, MD5, MDC2, RIPEMD160, SHA1, SHA224,
703e4520c8bSEnji Cooper    SHA256, SHA384, SHA512 and Whirlpool digest functions have been
704e4520c8bSEnji Cooper    deprecated.
705e4520c8bSEnji Cooper  * All of the low-level AES, Blowfish, Camellia, CAST, DES, IDEA, RC2,
706e4520c8bSEnji Cooper    RC4, RC5 and SEED cipher functions have been deprecated.
707e4520c8bSEnji Cooper  * All of the low-level DH, DSA, ECDH, ECDSA and RSA public key functions
708e4520c8bSEnji Cooper    have been deprecated.
709e4520c8bSEnji Cooper  * SSL 3, TLS 1.0, TLS 1.1, and DTLS 1.0 only work at security level 0,
710e4520c8bSEnji Cooper    except when RSA key exchange without SHA1 is used.
711e4520c8bSEnji Cooper  * Added providers, a new pluggability concept that will replace the
712e4520c8bSEnji Cooper    ENGINE API and ENGINE implementations.
713e4520c8bSEnji Cooper
714e4520c8bSEnji CooperOpenSSL 1.1.1
715e4520c8bSEnji Cooper-------------
716e4520c8bSEnji Cooper
717e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1k and OpenSSL 1.1.1l [24 Aug 2021]
718e4520c8bSEnji Cooper
719e4520c8bSEnji Cooper  * Fixed an SM2 Decryption Buffer Overflow ([CVE-2021-3711])
720e4520c8bSEnji Cooper  * Fixed various read buffer overruns processing ASN.1 strings ([CVE-2021-3712])
721e4520c8bSEnji Cooper
722e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1j and OpenSSL 1.1.1k [25 Mar 2021]
723e4520c8bSEnji Cooper
724e4520c8bSEnji Cooper  * Fixed a problem with verifying a certificate chain when using the
725e4520c8bSEnji Cooper    X509_V_FLAG_X509_STRICT flag ([CVE-2021-3450])
726e4520c8bSEnji Cooper  * Fixed an issue where an OpenSSL TLS server may crash if sent a maliciously
727e4520c8bSEnji Cooper    crafted renegotiation ClientHello message from a client ([CVE-2021-3449])
728e4520c8bSEnji Cooper
729e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1i and OpenSSL 1.1.1j [16 Feb 2021]
730e4520c8bSEnji Cooper
731e4520c8bSEnji Cooper  * Fixed a NULL pointer deref in the X509_issuer_and_serial_hash()
732e4520c8bSEnji Cooper    function ([CVE-2021-23841])
733e4520c8bSEnji Cooper  * Fixed the RSA_padding_check_SSLv23() function and the RSA_SSLV23_PADDING
734e4520c8bSEnji Cooper    padding mode to correctly check for rollback attacks
735e4520c8bSEnji Cooper  * Fixed an overflow in the EVP_CipherUpdate, EVP_EncryptUpdate and
736e4520c8bSEnji Cooper    EVP_DecryptUpdate functions ([CVE-2021-23840])
737e4520c8bSEnji Cooper  * Fixed SRP_Calc_client_key so that it runs in constant time
738e4520c8bSEnji Cooper
739e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1h and OpenSSL 1.1.1i [8 Dec 2020]
740e4520c8bSEnji Cooper
741e4520c8bSEnji Cooper  * Fixed NULL pointer deref in GENERAL_NAME_cmp ([CVE-2020-1971])
742e4520c8bSEnji Cooper
743e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1g and OpenSSL 1.1.1h [22 Sep 2020]
744e4520c8bSEnji Cooper
745e4520c8bSEnji Cooper  * Disallow explicit curve parameters in verifications chains when
746e4520c8bSEnji Cooper    X509_V_FLAG_X509_STRICT is used
747e4520c8bSEnji Cooper  * Enable 'MinProtocol' and 'MaxProtocol' to configure both TLS and DTLS
748e4520c8bSEnji Cooper    contexts
749e4520c8bSEnji Cooper  * Oracle Developer Studio will start reporting deprecation warnings
750e4520c8bSEnji Cooper
751e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1f and OpenSSL 1.1.1g [21 Apr 2020]
752e4520c8bSEnji Cooper
753e4520c8bSEnji Cooper  * Fixed segmentation fault in SSL_check_chain() ([CVE-2020-1967])
754e4520c8bSEnji Cooper
755e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1e and OpenSSL 1.1.1f [31 Mar 2020]
756e4520c8bSEnji Cooper
757e4520c8bSEnji Cooper  * Revert the unexpected EOF reporting via SSL_ERROR_SSL
758e4520c8bSEnji Cooper
759e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1d and OpenSSL 1.1.1e [17 Mar 2020]
760e4520c8bSEnji Cooper
761e4520c8bSEnji Cooper  * Fixed an overflow bug in the x64_64 Montgomery squaring procedure
762e4520c8bSEnji Cooper    used in exponentiation with 512-bit moduli ([CVE-2019-1551])
763e4520c8bSEnji Cooper
764e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1c and OpenSSL 1.1.1d [10 Sep 2019]
765e4520c8bSEnji Cooper
766e4520c8bSEnji Cooper  * Fixed a fork protection issue ([CVE-2019-1549])
767e4520c8bSEnji Cooper  * Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey
768e4520c8bSEnji Cooper    ([CVE-2019-1563])
769e4520c8bSEnji Cooper  * For built-in EC curves, ensure an EC_GROUP built from the curve name is
770e4520c8bSEnji Cooper    used even when parsing explicit parameters
771e4520c8bSEnji Cooper  * Compute ECC cofactors if not provided during EC_GROUP construction
772e4520c8bSEnji Cooper    ([CVE-2019-1547])
773e4520c8bSEnji Cooper  * Early start up entropy quality from the DEVRANDOM seed source has been
774e4520c8bSEnji Cooper    improved for older Linux systems
775e4520c8bSEnji Cooper  * Correct the extended master secret constant on EBCDIC systems
776e4520c8bSEnji Cooper  * Use Windows installation paths in the mingw builds ([CVE-2019-1552])
777e4520c8bSEnji Cooper  * Changed DH_check to accept parameters with order q and 2q subgroups
778e4520c8bSEnji Cooper  * Significantly reduce secure memory usage by the randomness pools
779e4520c8bSEnji Cooper  * Revert the DEVRANDOM_WAIT feature for Linux systems
780e4520c8bSEnji Cooper
781e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1b and OpenSSL 1.1.1c [28 May 2019]
782e4520c8bSEnji Cooper
783e4520c8bSEnji Cooper  * Prevent over long nonces in ChaCha20-Poly1305 ([CVE-2019-1543])
784e4520c8bSEnji Cooper
785e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1a and OpenSSL 1.1.1b [26 Feb 2019]
786e4520c8bSEnji Cooper
787e4520c8bSEnji Cooper  * Change the info callback signals for the start and end of a post-handshake
788e4520c8bSEnji Cooper    message exchange in TLSv1.3.
789e4520c8bSEnji Cooper  * Fix a bug in DTLS over SCTP. This breaks interoperability with older
790e4520c8bSEnji Cooper    versions of OpenSSL like OpenSSL 1.1.0 and OpenSSL 1.0.2.
791e4520c8bSEnji Cooper
792e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1 and OpenSSL 1.1.1a [20 Nov 2018]
793e4520c8bSEnji Cooper
794e4520c8bSEnji Cooper  * Timing vulnerability in DSA signature generation ([CVE-2018-0734])
795e4520c8bSEnji Cooper  * Timing vulnerability in ECDSA signature generation ([CVE-2018-0735])
796e4520c8bSEnji Cooper
797e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0i and OpenSSL 1.1.1 [11 Sep 2018]
798e4520c8bSEnji Cooper
799e4520c8bSEnji Cooper  * Support for TLSv1.3 added. The TLSv1.3 implementation includes:
800e4520c8bSEnji Cooper    * Fully compliant implementation of RFC8446 (TLSv1.3) on by default
801e4520c8bSEnji Cooper    * Early data (0-RTT)
802e4520c8bSEnji Cooper    * Post-handshake authentication and key update
803e4520c8bSEnji Cooper    * Middlebox Compatibility Mode
804e4520c8bSEnji Cooper    * TLSv1.3 PSKs
805e4520c8bSEnji Cooper    * Support for all five RFC8446 ciphersuites
806e4520c8bSEnji Cooper    * RSA-PSS signature algorithms (backported to TLSv1.2)
807e4520c8bSEnji Cooper    * Configurable session ticket support
808e4520c8bSEnji Cooper    * Stateless server support
809e4520c8bSEnji Cooper    * Rewrite of the packet construction code for "safer" packet handling
810e4520c8bSEnji Cooper    * Rewrite of the extension handling code
811e4520c8bSEnji Cooper    For further important information, see the [TLS1.3 page](
81229536654SEnji Cooper    https://github.com/openssl/openssl/wiki/TLS1.3) in the OpenSSL Wiki.
813e4520c8bSEnji Cooper
814e4520c8bSEnji Cooper  * Complete rewrite of the OpenSSL random number generator to introduce the
815e4520c8bSEnji Cooper    following capabilities
816e4520c8bSEnji Cooper      * The default RAND method now utilizes an AES-CTR DRBG according to
817e4520c8bSEnji Cooper        NIST standard SP 800-90Ar1.
818e4520c8bSEnji Cooper      * Support for multiple DRBG instances with seed chaining.
819e4520c8bSEnji Cooper      * There is a public and private DRBG instance.
820e4520c8bSEnji Cooper      * The DRBG instances are fork-safe.
821e4520c8bSEnji Cooper      * Keep all global DRBG instances on the secure heap if it is enabled.
822e4520c8bSEnji Cooper      * The public and private DRBG instance are per thread for lock free
823e4520c8bSEnji Cooper      operation
824e4520c8bSEnji Cooper  * Support for various new cryptographic algorithms including:
825e4520c8bSEnji Cooper      * SHA3
826e4520c8bSEnji Cooper      * SHA512/224 and SHA512/256
827e4520c8bSEnji Cooper      * EdDSA (both Ed25519 and Ed448) including X509 and TLS support
828e4520c8bSEnji Cooper      * X448 (adding to the existing X25519 support in 1.1.0)
829e4520c8bSEnji Cooper      * Multi-prime RSA
830e4520c8bSEnji Cooper      * SM2
831e4520c8bSEnji Cooper      * SM3
832e4520c8bSEnji Cooper      * SM4
833e4520c8bSEnji Cooper      * SipHash
834e4520c8bSEnji Cooper      * ARIA (including TLS support)
835e4520c8bSEnji Cooper  * Significant Side-Channel attack security improvements
836e4520c8bSEnji Cooper  * Add a new ClientHello callback to provide the ability to adjust the SSL
837e4520c8bSEnji Cooper  object at an early stage.
838e4520c8bSEnji Cooper  * Add 'Maximum Fragment Length' TLS extension negotiation and support
839e4520c8bSEnji Cooper  * A new STORE module, which implements a uniform and URI based reader of
840e4520c8bSEnji Cooper   stores that can contain keys, certificates, CRLs and numerous other
841e4520c8bSEnji Cooper  objects.
842e4520c8bSEnji Cooper  * Move the display of configuration data to configdata.pm.
843e4520c8bSEnji Cooper  * Allow GNU style "make variables" to be used with Configure.
844e4520c8bSEnji Cooper  * Claim the namespaces OSSL and OPENSSL, represented as symbol prefixes
845e4520c8bSEnji Cooper  * Rewrite of devcrypto engine
846e4520c8bSEnji Cooper
847e4520c8bSEnji CooperOpenSSL 1.1.0
848e4520c8bSEnji Cooper-------------
849e4520c8bSEnji Cooper
850e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0k and OpenSSL 1.1.0l [10 Sep 2019]
851e4520c8bSEnji Cooper
852e4520c8bSEnji Cooper  * Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey
853e4520c8bSEnji Cooper    ([CVE-2019-1563])
854e4520c8bSEnji Cooper  * For built-in EC curves, ensure an EC_GROUP built from the curve name is
855e4520c8bSEnji Cooper    used even when parsing explicit parameters
856e4520c8bSEnji Cooper  * Compute ECC cofactors if not provided during EC_GROUP construction
857e4520c8bSEnji Cooper    ([CVE-2019-1547])
858e4520c8bSEnji Cooper  * Use Windows installation paths in the mingw builds ([CVE-2019-1552])
859e4520c8bSEnji Cooper
860e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0j and OpenSSL 1.1.0k [28 May 2019]
861e4520c8bSEnji Cooper
862e4520c8bSEnji Cooper  * Prevent over long nonces in ChaCha20-Poly1305 ([CVE-2019-1543])
863e4520c8bSEnji Cooper
864e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0i and OpenSSL 1.1.0j [20 Nov 2018]
865e4520c8bSEnji Cooper
866e4520c8bSEnji Cooper  * Timing vulnerability in DSA signature generation ([CVE-2018-0734])
867e4520c8bSEnji Cooper  * Timing vulnerability in ECDSA signature generation ([CVE-2018-0735])
868e4520c8bSEnji Cooper
869e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0h and OpenSSL 1.1.0i [14 Aug 2018]
870e4520c8bSEnji Cooper
871e4520c8bSEnji Cooper  * Client DoS due to large DH parameter ([CVE-2018-0732])
872e4520c8bSEnji Cooper  * Cache timing vulnerability in RSA Key Generation ([CVE-2018-0737])
873e4520c8bSEnji Cooper
874e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0g and OpenSSL 1.1.0h [27 Mar 2018]
875e4520c8bSEnji Cooper
876e4520c8bSEnji Cooper  * Constructed ASN.1 types with a recursive definition could exceed the
877e4520c8bSEnji Cooper    stack ([CVE-2018-0739])
878e4520c8bSEnji Cooper  * Incorrect CRYPTO_memcmp on HP-UX PA-RISC ([CVE-2018-0733])
879e4520c8bSEnji Cooper  * rsaz_1024_mul_avx2 overflow bug on x86_64 ([CVE-2017-3738])
880e4520c8bSEnji Cooper
881e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0f and OpenSSL 1.1.0g [2 Nov 2017]
882e4520c8bSEnji Cooper
883e4520c8bSEnji Cooper  * bn_sqrx8x_internal carry bug on x86_64 ([CVE-2017-3736])
884e4520c8bSEnji Cooper  * Malformed X.509 IPAddressFamily could cause OOB read ([CVE-2017-3735])
885e4520c8bSEnji Cooper
886e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0e and OpenSSL 1.1.0f [25 May 2017]
887e4520c8bSEnji Cooper
888e4520c8bSEnji Cooper  * config now recognises 64-bit mingw and chooses mingw64 instead of mingw
889e4520c8bSEnji Cooper
890e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0d and OpenSSL 1.1.0e [16 Feb 2017]
891e4520c8bSEnji Cooper
892e4520c8bSEnji Cooper  * Encrypt-Then-Mac renegotiation crash ([CVE-2017-3733])
893e4520c8bSEnji Cooper
894e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0c and OpenSSL 1.1.0d [26 Jan 2017]
895e4520c8bSEnji Cooper
896e4520c8bSEnji Cooper  * Truncated packet could crash via OOB read ([CVE-2017-3731])
897e4520c8bSEnji Cooper  * Bad (EC)DHE parameters cause a client crash ([CVE-2017-3730])
898e4520c8bSEnji Cooper  * BN_mod_exp may produce incorrect results on x86_64 ([CVE-2017-3732])
899e4520c8bSEnji Cooper
900e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0b and OpenSSL 1.1.0c [10 Nov 2016]
901e4520c8bSEnji Cooper
902e4520c8bSEnji Cooper  * ChaCha20/Poly1305 heap-buffer-overflow ([CVE-2016-7054])
903e4520c8bSEnji Cooper  * CMS Null dereference ([CVE-2016-7053])
904e4520c8bSEnji Cooper  * Montgomery multiplication may produce incorrect results ([CVE-2016-7055])
905e4520c8bSEnji Cooper
906e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0a and OpenSSL 1.1.0b [26 Sep 2016]
907e4520c8bSEnji Cooper
908e4520c8bSEnji Cooper  * Fix Use After Free for large message sizes ([CVE-2016-6309])
909e4520c8bSEnji Cooper
910e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0 and OpenSSL 1.1.0a [22 Sep 2016]
911e4520c8bSEnji Cooper
912e4520c8bSEnji Cooper  * OCSP Status Request extension unbounded memory growth ([CVE-2016-6304])
913e4520c8bSEnji Cooper  * SSL_peek() hang on empty record ([CVE-2016-6305])
914e4520c8bSEnji Cooper  * Excessive allocation of memory in tls_get_message_header()
915e4520c8bSEnji Cooper    ([CVE-2016-6307])
916e4520c8bSEnji Cooper  * Excessive allocation of memory in dtls1_preprocess_fragment()
917e4520c8bSEnji Cooper    ([CVE-2016-6308])
918e4520c8bSEnji Cooper
919e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2h and OpenSSL 1.1.0 [25 Aug 2016]
920e4520c8bSEnji Cooper
921e4520c8bSEnji Cooper  * Copyright text was shrunk to a boilerplate that points to the license
922e4520c8bSEnji Cooper  * "shared" builds are now the default when possible
923e4520c8bSEnji Cooper  * Added support for "pipelining"
924e4520c8bSEnji Cooper  * Added the AFALG engine
925e4520c8bSEnji Cooper  * New threading API implemented
926e4520c8bSEnji Cooper  * Support for ChaCha20 and Poly1305 added to libcrypto and libssl
927e4520c8bSEnji Cooper  * Support for extended master secret
928e4520c8bSEnji Cooper  * CCM ciphersuites
929e4520c8bSEnji Cooper  * Reworked test suite, now based on perl, Test::Harness and Test::More
930e4520c8bSEnji Cooper  * *Most* libcrypto and libssl public structures were made opaque,
931e4520c8bSEnji Cooper    including:
932e4520c8bSEnji Cooper    BIGNUM and associated types, EC_KEY and EC_KEY_METHOD,
933e4520c8bSEnji Cooper    DH and DH_METHOD, DSA and DSA_METHOD, RSA and RSA_METHOD,
934e4520c8bSEnji Cooper    BIO and BIO_METHOD, EVP_MD_CTX, EVP_MD, EVP_CIPHER_CTX,
935e4520c8bSEnji Cooper    EVP_CIPHER, EVP_PKEY and associated types, HMAC_CTX,
936e4520c8bSEnji Cooper    X509, X509_CRL, X509_OBJECT, X509_STORE_CTX, X509_STORE,
937e4520c8bSEnji Cooper    X509_LOOKUP, X509_LOOKUP_METHOD
938e4520c8bSEnji Cooper  * libssl internal structures made opaque
939e4520c8bSEnji Cooper  * SSLv2 support removed
940e4520c8bSEnji Cooper  * Kerberos ciphersuite support removed
941e4520c8bSEnji Cooper  * RC4 removed from DEFAULT ciphersuites in libssl
942e4520c8bSEnji Cooper  * 40 and 56 bit cipher support removed from libssl
943e4520c8bSEnji Cooper  * All public header files moved to include/openssl, no more symlinking
944e4520c8bSEnji Cooper  * SSL/TLS state machine, version negotiation and record layer rewritten
945e4520c8bSEnji Cooper  * EC revision: now operations use new EC_KEY_METHOD.
946e4520c8bSEnji Cooper  * Support for OCB mode added to libcrypto
947e4520c8bSEnji Cooper  * Support for asynchronous crypto operations added to libcrypto and libssl
948e4520c8bSEnji Cooper  * Deprecated interfaces can now be disabled at build time either
949e4520c8bSEnji Cooper    relative to the latest release via the "no-deprecated" Configure
950e4520c8bSEnji Cooper    argument, or via the "--api=1.1.0|1.0.0|0.9.8" option.
951e4520c8bSEnji Cooper  * Application software can be compiled with -DOPENSSL_API_COMPAT=version
952e4520c8bSEnji Cooper    to ensure that features deprecated in that version are not exposed.
953e4520c8bSEnji Cooper  * Support for RFC6698/RFC7671 DANE TLSA peer authentication
954e4520c8bSEnji Cooper  * Change of Configure to use --prefix as the main installation
955e4520c8bSEnji Cooper    directory location rather than --openssldir.  The latter becomes
956e4520c8bSEnji Cooper    the directory for certs, private key and openssl.cnf exclusively.
957e4520c8bSEnji Cooper  * Reworked BIO networking library, with full support for IPv6.
958e4520c8bSEnji Cooper  * New "unified" build system
959e4520c8bSEnji Cooper  * New security levels
960e4520c8bSEnji Cooper  * Support for scrypt algorithm
961e4520c8bSEnji Cooper  * Support for X25519
962e4520c8bSEnji Cooper  * Extended SSL_CONF support using configuration files
963e4520c8bSEnji Cooper  * KDF algorithm support. Implement TLS PRF as a KDF.
964e4520c8bSEnji Cooper  * Support for Certificate Transparency
965e4520c8bSEnji Cooper  * HKDF support.
966e4520c8bSEnji Cooper
967e4520c8bSEnji CooperOpenSSL 1.0.2
968e4520c8bSEnji Cooper-------------
969e4520c8bSEnji Cooper
970e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2s and OpenSSL 1.0.2t [10 Sep 2019]
971e4520c8bSEnji Cooper
972e4520c8bSEnji Cooper  * Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey
973e4520c8bSEnji Cooper    ([CVE-2019-1563])
974e4520c8bSEnji Cooper  * For built-in EC curves, ensure an EC_GROUP built from the curve name is
975e4520c8bSEnji Cooper    used even when parsing explicit parameters
976e4520c8bSEnji Cooper  * Compute ECC cofactors if not provided during EC_GROUP construction
977e4520c8bSEnji Cooper    ([CVE-2019-1547])
978e4520c8bSEnji Cooper  * Document issue with installation paths in diverse Windows builds
979e4520c8bSEnji Cooper    ([CVE-2019-1552])
980e4520c8bSEnji Cooper
981e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2r and OpenSSL 1.0.2s [28 May 2019]
982e4520c8bSEnji Cooper
983e4520c8bSEnji Cooper  * None
984e4520c8bSEnji Cooper
985e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2q and OpenSSL 1.0.2r [26 Feb 2019]
986e4520c8bSEnji Cooper
987e4520c8bSEnji Cooper  * 0-byte record padding oracle ([CVE-2019-1559])
988e4520c8bSEnji Cooper
989e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2p and OpenSSL 1.0.2q [20 Nov 2018]
990e4520c8bSEnji Cooper
991e4520c8bSEnji Cooper  * Microarchitecture timing vulnerability in ECC scalar multiplication ([CVE-2018-5407])
992e4520c8bSEnji Cooper  * Timing vulnerability in DSA signature generation ([CVE-2018-0734])
993e4520c8bSEnji Cooper
994e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2o and OpenSSL 1.0.2p [14 Aug 2018]
995e4520c8bSEnji Cooper
996e4520c8bSEnji Cooper  * Client DoS due to large DH parameter ([CVE-2018-0732])
997e4520c8bSEnji Cooper  * Cache timing vulnerability in RSA Key Generation ([CVE-2018-0737])
998e4520c8bSEnji Cooper
999e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2n and OpenSSL 1.0.2o [27 Mar 2018]
1000e4520c8bSEnji Cooper
1001e4520c8bSEnji Cooper  * Constructed ASN.1 types with a recursive definition could exceed the
1002e4520c8bSEnji Cooper    stack ([CVE-2018-0739])
1003e4520c8bSEnji Cooper
1004e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2m and OpenSSL 1.0.2n [7 Dec 2017]
1005e4520c8bSEnji Cooper
1006e4520c8bSEnji Cooper  * Read/write after SSL object in error state ([CVE-2017-3737])
1007e4520c8bSEnji Cooper  * rsaz_1024_mul_avx2 overflow bug on x86_64 ([CVE-2017-3738])
1008e4520c8bSEnji Cooper
1009e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2l and OpenSSL 1.0.2m [2 Nov 2017]
1010e4520c8bSEnji Cooper
1011e4520c8bSEnji Cooper  * bn_sqrx8x_internal carry bug on x86_64 ([CVE-2017-3736])
1012e4520c8bSEnji Cooper  * Malformed X.509 IPAddressFamily could cause OOB read ([CVE-2017-3735])
1013e4520c8bSEnji Cooper
1014e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2k and OpenSSL 1.0.2l [25 May 2017]
1015e4520c8bSEnji Cooper
1016e4520c8bSEnji Cooper  * config now recognises 64-bit mingw and chooses mingw64 instead of mingw
1017e4520c8bSEnji Cooper
1018e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2j and OpenSSL 1.0.2k [26 Jan 2017]
1019e4520c8bSEnji Cooper
1020e4520c8bSEnji Cooper  * Truncated packet could crash via OOB read ([CVE-2017-3731])
1021e4520c8bSEnji Cooper  * BN_mod_exp may produce incorrect results on x86_64 ([CVE-2017-3732])
1022e4520c8bSEnji Cooper  * Montgomery multiplication may produce incorrect results ([CVE-2016-7055])
1023e4520c8bSEnji Cooper
1024e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2i and OpenSSL 1.0.2j [26 Sep 2016]
1025e4520c8bSEnji Cooper
1026e4520c8bSEnji Cooper  * Missing CRL sanity check ([CVE-2016-7052])
1027e4520c8bSEnji Cooper
1028e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2h and OpenSSL 1.0.2i [22 Sep 2016]
1029e4520c8bSEnji Cooper
1030e4520c8bSEnji Cooper  * OCSP Status Request extension unbounded memory growth ([CVE-2016-6304])
1031e4520c8bSEnji Cooper  * SWEET32 Mitigation ([CVE-2016-2183])
1032e4520c8bSEnji Cooper  * OOB write in MDC2_Update() ([CVE-2016-6303])
1033e4520c8bSEnji Cooper  * Malformed SHA512 ticket DoS ([CVE-2016-6302])
1034e4520c8bSEnji Cooper  * OOB write in BN_bn2dec() ([CVE-2016-2182])
1035e4520c8bSEnji Cooper  * OOB read in TS_OBJ_print_bio() ([CVE-2016-2180])
1036e4520c8bSEnji Cooper  * Pointer arithmetic undefined behaviour ([CVE-2016-2177])
1037e4520c8bSEnji Cooper  * Constant time flag not preserved in DSA signing ([CVE-2016-2178])
1038e4520c8bSEnji Cooper  * DTLS buffered message DoS ([CVE-2016-2179])
1039e4520c8bSEnji Cooper  * DTLS replay protection DoS ([CVE-2016-2181])
1040e4520c8bSEnji Cooper  * Certificate message OOB reads ([CVE-2016-6306])
1041e4520c8bSEnji Cooper
1042e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2g and OpenSSL 1.0.2h [3 May 2016]
1043e4520c8bSEnji Cooper
1044e4520c8bSEnji Cooper  * Prevent padding oracle in AES-NI CBC MAC check ([CVE-2016-2107])
1045e4520c8bSEnji Cooper  * Fix EVP_EncodeUpdate overflow ([CVE-2016-2105])
1046e4520c8bSEnji Cooper  * Fix EVP_EncryptUpdate overflow ([CVE-2016-2106])
1047e4520c8bSEnji Cooper  * Prevent ASN.1 BIO excessive memory allocation ([CVE-2016-2109])
1048e4520c8bSEnji Cooper  * EBCDIC overread ([CVE-2016-2176])
1049e4520c8bSEnji Cooper  * Modify behavior of ALPN to invoke callback after SNI/servername
1050e4520c8bSEnji Cooper    callback, such that updates to the SSL_CTX affect ALPN.
1051e4520c8bSEnji Cooper  * Remove LOW from the DEFAULT cipher list.  This removes singles DES from
1052e4520c8bSEnji Cooper    the default.
1053e4520c8bSEnji Cooper  * Only remove the SSLv2 methods with the no-ssl2-method option.
1054e4520c8bSEnji Cooper
1055e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2f and OpenSSL 1.0.2g [1 Mar 2016]
1056e4520c8bSEnji Cooper
1057e4520c8bSEnji Cooper  * Disable weak ciphers in SSLv3 and up in default builds of OpenSSL.
1058e4520c8bSEnji Cooper  * Disable SSLv2 default build, default negotiation and weak ciphers
1059e4520c8bSEnji Cooper    ([CVE-2016-0800])
1060e4520c8bSEnji Cooper  * Fix a double-free in DSA code ([CVE-2016-0705])
1061e4520c8bSEnji Cooper  * Disable SRP fake user seed to address a server memory leak
1062e4520c8bSEnji Cooper    ([CVE-2016-0798])
1063e4520c8bSEnji Cooper  * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption
1064e4520c8bSEnji Cooper    ([CVE-2016-0797])
1065e4520c8bSEnji Cooper  * Fix memory issues in BIO_*printf functions ([CVE-2016-0799])
1066e4520c8bSEnji Cooper  * Fix side channel attack on modular exponentiation ([CVE-2016-0702])
1067e4520c8bSEnji Cooper
1068e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2e and OpenSSL 1.0.2f [28 Jan 2016]
1069e4520c8bSEnji Cooper
1070e4520c8bSEnji Cooper  * DH small subgroups ([CVE-2016-0701])
1071e4520c8bSEnji Cooper  * SSLv2 doesn't block disabled ciphers ([CVE-2015-3197])
1072e4520c8bSEnji Cooper
1073e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2d and OpenSSL 1.0.2e [3 Dec 2015]
1074e4520c8bSEnji Cooper
1075e4520c8bSEnji Cooper  * BN_mod_exp may produce incorrect results on x86_64 ([CVE-2015-3193])
1076e4520c8bSEnji Cooper  * Certificate verify crash with missing PSS parameter ([CVE-2015-3194])
1077e4520c8bSEnji Cooper  * X509_ATTRIBUTE memory leak ([CVE-2015-3195])
1078e4520c8bSEnji Cooper  * Rewrite EVP_DecodeUpdate (base64 decoding) to fix several bugs
1079e4520c8bSEnji Cooper  * In DSA_generate_parameters_ex, if the provided seed is too short,
1080e4520c8bSEnji Cooper    return an error
1081e4520c8bSEnji Cooper
1082e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2c and OpenSSL 1.0.2d [9 Jul 2015]
1083e4520c8bSEnji Cooper
1084e4520c8bSEnji Cooper  * Alternate chains certificate forgery ([CVE-2015-1793])
1085e4520c8bSEnji Cooper  * Race condition handling PSK identify hint ([CVE-2015-3196])
1086e4520c8bSEnji Cooper
1087e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2b and OpenSSL 1.0.2c [12 Jun 2015]
1088e4520c8bSEnji Cooper
1089e4520c8bSEnji Cooper  * Fix HMAC ABI incompatibility
1090e4520c8bSEnji Cooper
1091e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2a and OpenSSL 1.0.2b [11 Jun 2015]
1092e4520c8bSEnji Cooper
1093e4520c8bSEnji Cooper  * Malformed ECParameters causes infinite loop ([CVE-2015-1788])
1094e4520c8bSEnji Cooper  * Exploitable out-of-bounds read in X509_cmp_time ([CVE-2015-1789])
1095e4520c8bSEnji Cooper  * PKCS7 crash with missing EnvelopedContent ([CVE-2015-1790])
1096e4520c8bSEnji Cooper  * CMS verify infinite loop with unknown hash function ([CVE-2015-1792])
1097e4520c8bSEnji Cooper  * Race condition handling NewSessionTicket ([CVE-2015-1791])
1098e4520c8bSEnji Cooper
1099e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2 and OpenSSL 1.0.2a [19 Mar 2015]
1100e4520c8bSEnji Cooper
1101e4520c8bSEnji Cooper  * OpenSSL 1.0.2 ClientHello sigalgs DoS fix ([CVE-2015-0291])
1102e4520c8bSEnji Cooper  * Multiblock corrupted pointer fix ([CVE-2015-0290])
1103e4520c8bSEnji Cooper  * Segmentation fault in DTLSv1_listen fix ([CVE-2015-0207])
1104e4520c8bSEnji Cooper  * Segmentation fault in ASN1_TYPE_cmp fix ([CVE-2015-0286])
1105e4520c8bSEnji Cooper  * Segmentation fault for invalid PSS parameters fix ([CVE-2015-0208])
1106e4520c8bSEnji Cooper  * ASN.1 structure reuse memory corruption fix ([CVE-2015-0287])
1107e4520c8bSEnji Cooper  * PKCS7 NULL pointer dereferences fix ([CVE-2015-0289])
1108e4520c8bSEnji Cooper  * DoS via reachable assert in SSLv2 servers fix ([CVE-2015-0293])
1109e4520c8bSEnji Cooper  * Empty CKE with client auth and DHE fix ([CVE-2015-1787])
1110e4520c8bSEnji Cooper  * Handshake with unseeded PRNG fix ([CVE-2015-0285])
1111e4520c8bSEnji Cooper  * Use After Free following d2i_ECPrivatekey error fix ([CVE-2015-0209])
1112e4520c8bSEnji Cooper  * X509_to_X509_REQ NULL pointer deref fix ([CVE-2015-0288])
1113e4520c8bSEnji Cooper  * Removed the export ciphers from the DEFAULT ciphers
1114e4520c8bSEnji Cooper
1115e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1l and OpenSSL 1.0.2 [22 Jan 2015]
1116e4520c8bSEnji Cooper
1117e4520c8bSEnji Cooper  * Suite B support for TLS 1.2 and DTLS 1.2
1118e4520c8bSEnji Cooper  * Support for DTLS 1.2
1119e4520c8bSEnji Cooper  * TLS automatic EC curve selection.
1120e4520c8bSEnji Cooper  * API to set TLS supported signature algorithms and curves
1121e4520c8bSEnji Cooper  * SSL_CONF configuration API.
1122e4520c8bSEnji Cooper  * TLS Brainpool support.
1123e4520c8bSEnji Cooper  * ALPN support.
1124e4520c8bSEnji Cooper  * CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH.
1125e4520c8bSEnji Cooper
1126e4520c8bSEnji CooperOpenSSL 1.0.1
1127e4520c8bSEnji Cooper-------------
1128e4520c8bSEnji Cooper
1129e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1t and OpenSSL 1.0.1u [22 Sep 2016]
1130e4520c8bSEnji Cooper
1131e4520c8bSEnji Cooper  * OCSP Status Request extension unbounded memory growth ([CVE-2016-6304])
1132e4520c8bSEnji Cooper  * SWEET32 Mitigation ([CVE-2016-2183])
1133e4520c8bSEnji Cooper  * OOB write in MDC2_Update() ([CVE-2016-6303])
1134e4520c8bSEnji Cooper  * Malformed SHA512 ticket DoS ([CVE-2016-6302])
1135e4520c8bSEnji Cooper  * OOB write in BN_bn2dec() ([CVE-2016-2182])
1136e4520c8bSEnji Cooper  * OOB read in TS_OBJ_print_bio() ([CVE-2016-2180])
1137e4520c8bSEnji Cooper  * Pointer arithmetic undefined behaviour ([CVE-2016-2177])
1138e4520c8bSEnji Cooper  * Constant time flag not preserved in DSA signing ([CVE-2016-2178])
1139e4520c8bSEnji Cooper  * DTLS buffered message DoS ([CVE-2016-2179])
1140e4520c8bSEnji Cooper  * DTLS replay protection DoS ([CVE-2016-2181])
1141e4520c8bSEnji Cooper  * Certificate message OOB reads ([CVE-2016-6306])
1142e4520c8bSEnji Cooper
1143e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1s and OpenSSL 1.0.1t [3 May 2016]
1144e4520c8bSEnji Cooper
1145e4520c8bSEnji Cooper  * Prevent padding oracle in AES-NI CBC MAC check ([CVE-2016-2107])
1146e4520c8bSEnji Cooper  * Fix EVP_EncodeUpdate overflow ([CVE-2016-2105])
1147e4520c8bSEnji Cooper  * Fix EVP_EncryptUpdate overflow ([CVE-2016-2106])
1148e4520c8bSEnji Cooper  * Prevent ASN.1 BIO excessive memory allocation ([CVE-2016-2109])
1149e4520c8bSEnji Cooper  * EBCDIC overread ([CVE-2016-2176])
1150e4520c8bSEnji Cooper  * Modify behavior of ALPN to invoke callback after SNI/servername
1151e4520c8bSEnji Cooper    callback, such that updates to the SSL_CTX affect ALPN.
1152e4520c8bSEnji Cooper  * Remove LOW from the DEFAULT cipher list.  This removes singles DES from
1153e4520c8bSEnji Cooper    the default.
1154e4520c8bSEnji Cooper  * Only remove the SSLv2 methods with the no-ssl2-method option.
1155e4520c8bSEnji Cooper
1156e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1r and OpenSSL 1.0.1s [1 Mar 2016]
1157e4520c8bSEnji Cooper
1158e4520c8bSEnji Cooper  * Disable weak ciphers in SSLv3 and up in default builds of OpenSSL.
1159e4520c8bSEnji Cooper  * Disable SSLv2 default build, default negotiation and weak ciphers
1160e4520c8bSEnji Cooper    ([CVE-2016-0800])
1161e4520c8bSEnji Cooper  * Fix a double-free in DSA code ([CVE-2016-0705])
1162e4520c8bSEnji Cooper  * Disable SRP fake user seed to address a server memory leak
1163e4520c8bSEnji Cooper    ([CVE-2016-0798])
1164e4520c8bSEnji Cooper  * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption
1165e4520c8bSEnji Cooper    ([CVE-2016-0797])
1166e4520c8bSEnji Cooper  * Fix memory issues in BIO_*printf functions ([CVE-2016-0799])
1167e4520c8bSEnji Cooper  * Fix side channel attack on modular exponentiation ([CVE-2016-0702])
1168e4520c8bSEnji Cooper
1169e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1q and OpenSSL 1.0.1r [28 Jan 2016]
1170e4520c8bSEnji Cooper
1171e4520c8bSEnji Cooper  * Protection for DH small subgroup attacks
1172e4520c8bSEnji Cooper  * SSLv2 doesn't block disabled ciphers ([CVE-2015-3197])
1173e4520c8bSEnji Cooper
1174e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1p and OpenSSL 1.0.1q [3 Dec 2015]
1175e4520c8bSEnji Cooper
1176e4520c8bSEnji Cooper  * Certificate verify crash with missing PSS parameter ([CVE-2015-3194])
1177e4520c8bSEnji Cooper  * X509_ATTRIBUTE memory leak ([CVE-2015-3195])
1178e4520c8bSEnji Cooper  * Rewrite EVP_DecodeUpdate (base64 decoding) to fix several bugs
1179e4520c8bSEnji Cooper  * In DSA_generate_parameters_ex, if the provided seed is too short,
1180e4520c8bSEnji Cooper    return an error
1181e4520c8bSEnji Cooper
1182e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1o and OpenSSL 1.0.1p [9 Jul 2015]
1183e4520c8bSEnji Cooper
1184e4520c8bSEnji Cooper  * Alternate chains certificate forgery ([CVE-2015-1793])
1185e4520c8bSEnji Cooper  * Race condition handling PSK identify hint ([CVE-2015-3196])
1186e4520c8bSEnji Cooper
1187e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1n and OpenSSL 1.0.1o [12 Jun 2015]
1188e4520c8bSEnji Cooper
1189e4520c8bSEnji Cooper  * Fix HMAC ABI incompatibility
1190e4520c8bSEnji Cooper
1191e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1m and OpenSSL 1.0.1n [11 Jun 2015]
1192e4520c8bSEnji Cooper
1193e4520c8bSEnji Cooper  * Malformed ECParameters causes infinite loop ([CVE-2015-1788])
1194e4520c8bSEnji Cooper  * Exploitable out-of-bounds read in X509_cmp_time ([CVE-2015-1789])
1195e4520c8bSEnji Cooper  * PKCS7 crash with missing EnvelopedContent ([CVE-2015-1790])
1196e4520c8bSEnji Cooper  * CMS verify infinite loop with unknown hash function ([CVE-2015-1792])
1197e4520c8bSEnji Cooper  * Race condition handling NewSessionTicket ([CVE-2015-1791])
1198e4520c8bSEnji Cooper
1199e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1l and OpenSSL 1.0.1m [19 Mar 2015]
1200e4520c8bSEnji Cooper
1201e4520c8bSEnji Cooper  * Segmentation fault in ASN1_TYPE_cmp fix ([CVE-2015-0286])
1202e4520c8bSEnji Cooper  * ASN.1 structure reuse memory corruption fix ([CVE-2015-0287])
1203e4520c8bSEnji Cooper  * PKCS7 NULL pointer dereferences fix ([CVE-2015-0289])
1204e4520c8bSEnji Cooper  * DoS via reachable assert in SSLv2 servers fix ([CVE-2015-0293])
1205e4520c8bSEnji Cooper  * Use After Free following d2i_ECPrivatekey error fix ([CVE-2015-0209])
1206e4520c8bSEnji Cooper  * X509_to_X509_REQ NULL pointer deref fix ([CVE-2015-0288])
1207e4520c8bSEnji Cooper  * Removed the export ciphers from the DEFAULT ciphers
1208e4520c8bSEnji Cooper
1209e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1k and OpenSSL 1.0.1l [15 Jan 2015]
1210e4520c8bSEnji Cooper
1211e4520c8bSEnji Cooper  * Build fixes for the Windows and OpenVMS platforms
1212e4520c8bSEnji Cooper
1213e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1j and OpenSSL 1.0.1k [8 Jan 2015]
1214e4520c8bSEnji Cooper
1215e4520c8bSEnji Cooper  * Fix for [CVE-2014-3571]
1216e4520c8bSEnji Cooper  * Fix for [CVE-2015-0206]
1217e4520c8bSEnji Cooper  * Fix for [CVE-2014-3569]
1218e4520c8bSEnji Cooper  * Fix for [CVE-2014-3572]
1219e4520c8bSEnji Cooper  * Fix for [CVE-2015-0204]
1220e4520c8bSEnji Cooper  * Fix for [CVE-2015-0205]
1221e4520c8bSEnji Cooper  * Fix for [CVE-2014-8275]
1222e4520c8bSEnji Cooper  * Fix for [CVE-2014-3570]
1223e4520c8bSEnji Cooper
1224e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1i and OpenSSL 1.0.1j [15 Oct 2014]
1225e4520c8bSEnji Cooper
1226e4520c8bSEnji Cooper  * Fix for [CVE-2014-3513]
1227e4520c8bSEnji Cooper  * Fix for [CVE-2014-3567]
1228e4520c8bSEnji Cooper  * Mitigation for [CVE-2014-3566] (SSL protocol vulnerability)
1229e4520c8bSEnji Cooper  * Fix for [CVE-2014-3568]
1230e4520c8bSEnji Cooper
1231e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1h and OpenSSL 1.0.1i [6 Aug 2014]
1232e4520c8bSEnji Cooper
1233e4520c8bSEnji Cooper  * Fix for [CVE-2014-3512]
1234e4520c8bSEnji Cooper  * Fix for [CVE-2014-3511]
1235e4520c8bSEnji Cooper  * Fix for [CVE-2014-3510]
1236e4520c8bSEnji Cooper  * Fix for [CVE-2014-3507]
1237e4520c8bSEnji Cooper  * Fix for [CVE-2014-3506]
1238e4520c8bSEnji Cooper  * Fix for [CVE-2014-3505]
1239e4520c8bSEnji Cooper  * Fix for [CVE-2014-3509]
1240e4520c8bSEnji Cooper  * Fix for [CVE-2014-5139]
1241e4520c8bSEnji Cooper  * Fix for [CVE-2014-3508]
1242e4520c8bSEnji Cooper
1243e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1g and OpenSSL 1.0.1h [5 Jun 2014]
1244e4520c8bSEnji Cooper
1245e4520c8bSEnji Cooper  * Fix for [CVE-2014-0224]
1246e4520c8bSEnji Cooper  * Fix for [CVE-2014-0221]
1247e4520c8bSEnji Cooper  * Fix for [CVE-2014-0198]
1248e4520c8bSEnji Cooper  * Fix for [CVE-2014-0195]
1249e4520c8bSEnji Cooper  * Fix for [CVE-2014-3470]
1250e4520c8bSEnji Cooper  * Fix for [CVE-2010-5298]
1251e4520c8bSEnji Cooper
1252e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1f and OpenSSL 1.0.1g [7 Apr 2014]
1253e4520c8bSEnji Cooper
1254e4520c8bSEnji Cooper  * Fix for [CVE-2014-0160]
1255e4520c8bSEnji Cooper  * Add TLS padding extension workaround for broken servers.
1256e4520c8bSEnji Cooper  * Fix for [CVE-2014-0076]
1257e4520c8bSEnji Cooper
1258e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1e and OpenSSL 1.0.1f [6 Jan 2014]
1259e4520c8bSEnji Cooper
1260e4520c8bSEnji Cooper  * Don't include gmt_unix_time in TLS server and client random values
1261e4520c8bSEnji Cooper  * Fix for TLS record tampering bug ([CVE-2013-4353])
1262e4520c8bSEnji Cooper  * Fix for TLS version checking bug ([CVE-2013-6449])
1263e4520c8bSEnji Cooper  * Fix for DTLS retransmission bug ([CVE-2013-6450])
1264e4520c8bSEnji Cooper
1265e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1d and OpenSSL 1.0.1e [11 Feb 2013]
1266e4520c8bSEnji Cooper
1267e4520c8bSEnji Cooper  * Corrected fix for ([CVE-2013-0169])
1268e4520c8bSEnji Cooper
1269e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1c and OpenSSL 1.0.1d [4 Feb 2013]
1270e4520c8bSEnji Cooper
1271e4520c8bSEnji Cooper  * Fix renegotiation in TLS 1.1, 1.2 by using the correct TLS version.
1272e4520c8bSEnji Cooper  * Include the fips configuration module.
1273e4520c8bSEnji Cooper  * Fix OCSP bad key DoS attack ([CVE-2013-0166])
1274e4520c8bSEnji Cooper  * Fix for SSL/TLS/DTLS CBC plaintext recovery attack ([CVE-2013-0169])
1275e4520c8bSEnji Cooper  * Fix for TLS AESNI record handling flaw ([CVE-2012-2686])
1276e4520c8bSEnji Cooper
1277e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1b and OpenSSL 1.0.1c [10 May 2012]
1278e4520c8bSEnji Cooper
1279e4520c8bSEnji Cooper  * Fix TLS/DTLS record length checking bug ([CVE-2012-2333])
1280e4520c8bSEnji Cooper  * Don't attempt to use non-FIPS composite ciphers in FIPS mode.
1281e4520c8bSEnji Cooper
1282e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1a and OpenSSL 1.0.1b [26 Apr 2012]
1283e4520c8bSEnji Cooper
1284e4520c8bSEnji Cooper  * Fix compilation error on non-x86 platforms.
1285e4520c8bSEnji Cooper  * Make FIPS capable OpenSSL ciphers work in non-FIPS mode.
1286e4520c8bSEnji Cooper  * Fix SSL_OP_NO_TLSv1_1 clash with SSL_OP_ALL in OpenSSL 1.0.0
1287e4520c8bSEnji Cooper
1288e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1 and OpenSSL 1.0.1a [19 Apr 2012]
1289e4520c8bSEnji Cooper
1290e4520c8bSEnji Cooper  * Fix for ASN1 overflow bug ([CVE-2012-2110])
1291e4520c8bSEnji Cooper  * Workarounds for some servers that hang on long client hellos.
1292e4520c8bSEnji Cooper  * Fix SEGV in AES code.
1293e4520c8bSEnji Cooper
1294e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.1 [14 Mar 2012]
1295e4520c8bSEnji Cooper
1296e4520c8bSEnji Cooper  * TLS/DTLS heartbeat support.
1297e4520c8bSEnji Cooper  * SCTP support.
1298e4520c8bSEnji Cooper  * RFC 5705 TLS key material exporter.
1299e4520c8bSEnji Cooper  * RFC 5764 DTLS-SRTP negotiation.
1300e4520c8bSEnji Cooper  * Next Protocol Negotiation.
1301e4520c8bSEnji Cooper  * PSS signatures in certificates, requests and CRLs.
1302e4520c8bSEnji Cooper  * Support for password based recipient info for CMS.
1303e4520c8bSEnji Cooper  * Support TLS v1.2 and TLS v1.1.
1304e4520c8bSEnji Cooper  * Preliminary FIPS capability for unvalidated 2.0 FIPS module.
1305e4520c8bSEnji Cooper  * SRP support.
1306e4520c8bSEnji Cooper
1307e4520c8bSEnji CooperOpenSSL 1.0.0
1308e4520c8bSEnji Cooper-------------
1309e4520c8bSEnji Cooper
1310e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0s and OpenSSL 1.0.0t [3 Dec 2015]
1311e4520c8bSEnji Cooper
1312e4520c8bSEnji Cooper  * X509_ATTRIBUTE memory leak (([CVE-2015-3195]))
1313e4520c8bSEnji Cooper  * Race condition handling PSK identify hint ([CVE-2015-3196])
1314e4520c8bSEnji Cooper
1315e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0r and OpenSSL 1.0.0s [11 Jun 2015]
1316e4520c8bSEnji Cooper
1317e4520c8bSEnji Cooper  * Malformed ECParameters causes infinite loop ([CVE-2015-1788])
1318e4520c8bSEnji Cooper  * Exploitable out-of-bounds read in X509_cmp_time ([CVE-2015-1789])
1319e4520c8bSEnji Cooper  * PKCS7 crash with missing EnvelopedContent ([CVE-2015-1790])
1320e4520c8bSEnji Cooper  * CMS verify infinite loop with unknown hash function ([CVE-2015-1792])
1321e4520c8bSEnji Cooper  * Race condition handling NewSessionTicket ([CVE-2015-1791])
1322e4520c8bSEnji Cooper
1323e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0q and OpenSSL 1.0.0r [19 Mar 2015]
1324e4520c8bSEnji Cooper
1325e4520c8bSEnji Cooper  * Segmentation fault in ASN1_TYPE_cmp fix ([CVE-2015-0286])
1326e4520c8bSEnji Cooper  * ASN.1 structure reuse memory corruption fix ([CVE-2015-0287])
1327e4520c8bSEnji Cooper  * PKCS7 NULL pointer dereferences fix ([CVE-2015-0289])
1328e4520c8bSEnji Cooper  * DoS via reachable assert in SSLv2 servers fix ([CVE-2015-0293])
1329e4520c8bSEnji Cooper  * Use After Free following d2i_ECPrivatekey error fix ([CVE-2015-0209])
1330e4520c8bSEnji Cooper  * X509_to_X509_REQ NULL pointer deref fix ([CVE-2015-0288])
1331e4520c8bSEnji Cooper  * Removed the export ciphers from the DEFAULT ciphers
1332e4520c8bSEnji Cooper
1333e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0p and OpenSSL 1.0.0q [15 Jan 2015]
1334e4520c8bSEnji Cooper
1335e4520c8bSEnji Cooper  * Build fixes for the Windows and OpenVMS platforms
1336e4520c8bSEnji Cooper
1337e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0o and OpenSSL 1.0.0p [8 Jan 2015]
1338e4520c8bSEnji Cooper
1339e4520c8bSEnji Cooper  * Fix for [CVE-2014-3571]
1340e4520c8bSEnji Cooper  * Fix for [CVE-2015-0206]
1341e4520c8bSEnji Cooper  * Fix for [CVE-2014-3569]
1342e4520c8bSEnji Cooper  * Fix for [CVE-2014-3572]
1343e4520c8bSEnji Cooper  * Fix for [CVE-2015-0204]
1344e4520c8bSEnji Cooper  * Fix for [CVE-2015-0205]
1345e4520c8bSEnji Cooper  * Fix for [CVE-2014-8275]
1346e4520c8bSEnji Cooper  * Fix for [CVE-2014-3570]
1347e4520c8bSEnji Cooper
1348e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0n and OpenSSL 1.0.0o [15 Oct 2014]
1349e4520c8bSEnji Cooper
1350e4520c8bSEnji Cooper  * Fix for [CVE-2014-3513]
1351e4520c8bSEnji Cooper  * Fix for [CVE-2014-3567]
1352e4520c8bSEnji Cooper  * Mitigation for [CVE-2014-3566] (SSL protocol vulnerability)
1353e4520c8bSEnji Cooper  * Fix for [CVE-2014-3568]
1354e4520c8bSEnji Cooper
1355e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0m and OpenSSL 1.0.0n [6 Aug 2014]
1356e4520c8bSEnji Cooper
1357e4520c8bSEnji Cooper  * Fix for [CVE-2014-3510]
1358e4520c8bSEnji Cooper  * Fix for [CVE-2014-3507]
1359e4520c8bSEnji Cooper  * Fix for [CVE-2014-3506]
1360e4520c8bSEnji Cooper  * Fix for [CVE-2014-3505]
1361e4520c8bSEnji Cooper  * Fix for [CVE-2014-3509]
1362e4520c8bSEnji Cooper  * Fix for [CVE-2014-3508]
1363e4520c8bSEnji Cooper
1364e4520c8bSEnji Cooper  Known issues in OpenSSL 1.0.0m:
1365e4520c8bSEnji Cooper
1366e4520c8bSEnji Cooper  * EAP-FAST and other applications using tls_session_secret_cb
1367e4520c8bSEnji Cooper    won't resume sessions. Fixed in 1.0.0n-dev
1368e4520c8bSEnji Cooper  * Compilation failure of s3_pkt.c on some platforms due to missing
1369e4520c8bSEnji Cooper    `<limits.h>` include. Fixed in 1.0.0n-dev
1370e4520c8bSEnji Cooper
1371e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0l and OpenSSL 1.0.0m [5 Jun 2014]
1372e4520c8bSEnji Cooper
1373e4520c8bSEnji Cooper  * Fix for [CVE-2014-0224]
1374e4520c8bSEnji Cooper  * Fix for [CVE-2014-0221]
1375e4520c8bSEnji Cooper  * Fix for [CVE-2014-0198]
1376e4520c8bSEnji Cooper  * Fix for [CVE-2014-0195]
1377e4520c8bSEnji Cooper  * Fix for [CVE-2014-3470]
1378e4520c8bSEnji Cooper  * Fix for [CVE-2014-0076]
1379e4520c8bSEnji Cooper  * Fix for [CVE-2010-5298]
1380e4520c8bSEnji Cooper
1381e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0k and OpenSSL 1.0.0l [6 Jan 2014]
1382e4520c8bSEnji Cooper
1383e4520c8bSEnji Cooper  * Fix for DTLS retransmission bug ([CVE-2013-6450])
1384e4520c8bSEnji Cooper
1385e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0j and OpenSSL 1.0.0k [5 Feb 2013]
1386e4520c8bSEnji Cooper
1387e4520c8bSEnji Cooper  * Fix for SSL/TLS/DTLS CBC plaintext recovery attack ([CVE-2013-0169])
1388e4520c8bSEnji Cooper  * Fix OCSP bad key DoS attack ([CVE-2013-0166])
1389e4520c8bSEnji Cooper
1390e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0i and OpenSSL 1.0.0j [10 May 2012]
1391e4520c8bSEnji Cooper
1392e4520c8bSEnji Cooper  * Fix DTLS record length checking bug ([CVE-2012-2333])
1393e4520c8bSEnji Cooper
1394e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.0i [19 Apr 2012]
1395e4520c8bSEnji Cooper
1396e4520c8bSEnji Cooper  * Fix for ASN1 overflow bug ([CVE-2012-2110])
1397e4520c8bSEnji Cooper
1398e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0g and OpenSSL 1.0.0h [12 Mar 2012]
1399e4520c8bSEnji Cooper
1400e4520c8bSEnji Cooper  * Fix for CMS/PKCS#7 MMA ([CVE-2012-0884])
1401e4520c8bSEnji Cooper  * Corrected fix for ([CVE-2011-4619])
1402e4520c8bSEnji Cooper  * Various DTLS fixes.
1403e4520c8bSEnji Cooper
1404e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0f and OpenSSL 1.0.0g [18 Jan 2012]
1405e4520c8bSEnji Cooper
1406e4520c8bSEnji Cooper  * Fix for DTLS DoS issue ([CVE-2012-0050])
1407e4520c8bSEnji Cooper
1408e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0e and OpenSSL 1.0.0f [4 Jan 2012]
1409e4520c8bSEnji Cooper
1410e4520c8bSEnji Cooper  * Fix for DTLS plaintext recovery attack ([CVE-2011-4108])
1411e4520c8bSEnji Cooper  * Clear block padding bytes of SSL 3.0 records ([CVE-2011-4576])
1412e4520c8bSEnji Cooper  * Only allow one SGC handshake restart for SSL/TLS ([CVE-2011-4619])
1413e4520c8bSEnji Cooper  * Check parameters are not NULL in GOST ENGINE ([CVE-2012-0027])
1414e4520c8bSEnji Cooper  * Check for malformed RFC3779 data ([CVE-2011-4577])
1415e4520c8bSEnji Cooper
1416e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0d and OpenSSL 1.0.0e [6 Sep 2011]
1417e4520c8bSEnji Cooper
1418e4520c8bSEnji Cooper  * Fix for CRL vulnerability issue ([CVE-2011-3207])
1419e4520c8bSEnji Cooper  * Fix for ECDH crashes ([CVE-2011-3210])
1420e4520c8bSEnji Cooper  * Protection against EC timing attacks.
1421e4520c8bSEnji Cooper  * Support ECDH ciphersuites for certificates using SHA2 algorithms.
1422e4520c8bSEnji Cooper  * Various DTLS fixes.
1423e4520c8bSEnji Cooper
1424e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0c and OpenSSL 1.0.0d [8 Feb 2011]
1425e4520c8bSEnji Cooper
1426e4520c8bSEnji Cooper  * Fix for security issue ([CVE-2011-0014])
1427e4520c8bSEnji Cooper
1428e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0b and OpenSSL 1.0.0c [2 Dec 2010]
1429e4520c8bSEnji Cooper
1430e4520c8bSEnji Cooper  * Fix for security issue ([CVE-2010-4180])
1431e4520c8bSEnji Cooper  * Fix for ([CVE-2010-4252])
1432e4520c8bSEnji Cooper  * Fix mishandling of absent EC point format extension.
1433e4520c8bSEnji Cooper  * Fix various platform compilation issues.
1434e4520c8bSEnji Cooper  * Corrected fix for security issue ([CVE-2010-3864]).
1435e4520c8bSEnji Cooper
1436e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0a and OpenSSL 1.0.0b [16 Nov 2010]
1437e4520c8bSEnji Cooper
1438e4520c8bSEnji Cooper  * Fix for security issue ([CVE-2010-3864]).
1439e4520c8bSEnji Cooper  * Fix for ([CVE-2010-2939])
1440e4520c8bSEnji Cooper  * Fix WIN32 build system for GOST ENGINE.
1441e4520c8bSEnji Cooper
1442e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0 and OpenSSL 1.0.0a [1 Jun 2010]
1443e4520c8bSEnji Cooper
1444e4520c8bSEnji Cooper  * Fix for security issue ([CVE-2010-1633]).
1445e4520c8bSEnji Cooper  * GOST MAC and CFB fixes.
1446e4520c8bSEnji Cooper
1447e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8n and OpenSSL 1.0.0 [29 Mar 2010]
1448e4520c8bSEnji Cooper
1449e4520c8bSEnji Cooper  * RFC3280 path validation: sufficient to process PKITS tests.
1450e4520c8bSEnji Cooper  * Integrated support for PVK files and keyblobs.
1451e4520c8bSEnji Cooper  * Change default private key format to PKCS#8.
1452e4520c8bSEnji Cooper  * CMS support: able to process all examples in RFC4134
1453e4520c8bSEnji Cooper  * Streaming ASN1 encode support for PKCS#7 and CMS.
1454e4520c8bSEnji Cooper  * Multiple signer and signer add support for PKCS#7 and CMS.
1455e4520c8bSEnji Cooper  * ASN1 printing support.
1456e4520c8bSEnji Cooper  * Whirlpool hash algorithm added.
1457e4520c8bSEnji Cooper  * RFC3161 time stamp support.
1458e4520c8bSEnji Cooper  * New generalised public key API supporting ENGINE based algorithms.
1459e4520c8bSEnji Cooper  * New generalised public key API utilities.
1460e4520c8bSEnji Cooper  * New ENGINE supporting GOST algorithms.
1461e4520c8bSEnji Cooper  * SSL/TLS GOST ciphersuite support.
1462e4520c8bSEnji Cooper  * PKCS#7 and CMS GOST support.
1463e4520c8bSEnji Cooper  * RFC4279 PSK ciphersuite support.
1464e4520c8bSEnji Cooper  * Supported points format extension for ECC ciphersuites.
1465e4520c8bSEnji Cooper  * ecdsa-with-SHA224/256/384/512 signature types.
1466e4520c8bSEnji Cooper  * dsa-with-SHA224 and dsa-with-SHA256 signature types.
1467e4520c8bSEnji Cooper  * Opaque PRF Input TLS extension support.
1468e4520c8bSEnji Cooper  * Updated time routines to avoid OS limitations.
1469e4520c8bSEnji Cooper
1470e4520c8bSEnji CooperOpenSSL 0.9.x
1471e4520c8bSEnji Cooper-------------
1472e4520c8bSEnji Cooper
1473e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8m and OpenSSL 0.9.8n [24 Mar 2010]
1474e4520c8bSEnji Cooper
1475e4520c8bSEnji Cooper  * CFB cipher definition fixes.
1476e4520c8bSEnji Cooper  * Fix security issues [CVE-2010-0740] and [CVE-2010-0433].
1477e4520c8bSEnji Cooper
1478e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8l and OpenSSL 0.9.8m [25 Feb 2010]
1479e4520c8bSEnji Cooper
1480e4520c8bSEnji Cooper  * Cipher definition fixes.
1481e4520c8bSEnji Cooper  * Workaround for slow RAND_poll() on some WIN32 versions.
1482e4520c8bSEnji Cooper  * Remove MD2 from algorithm tables.
1483e4520c8bSEnji Cooper  * SPKAC handling fixes.
1484e4520c8bSEnji Cooper  * Support for RFC5746 TLS renegotiation extension.
1485e4520c8bSEnji Cooper  * Compression memory leak fixed.
1486e4520c8bSEnji Cooper  * Compression session resumption fixed.
1487e4520c8bSEnji Cooper  * Ticket and SNI coexistence fixes.
1488e4520c8bSEnji Cooper  * Many fixes to DTLS handling.
1489e4520c8bSEnji Cooper
1490e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8k and OpenSSL 0.9.8l [5 Nov 2009]
1491e4520c8bSEnji Cooper
1492e4520c8bSEnji Cooper  * Temporary work around for [CVE-2009-3555]: disable renegotiation.
1493e4520c8bSEnji Cooper
1494e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8j and OpenSSL 0.9.8k [25 Mar 2009]
1495e4520c8bSEnji Cooper
1496e4520c8bSEnji Cooper  * Fix various build issues.
1497e4520c8bSEnji Cooper  * Fix security issues [CVE-2009-0590], [CVE-2009-0591], [CVE-2009-0789]
1498e4520c8bSEnji Cooper
1499e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8i and OpenSSL 0.9.8j [7 Jan 2009]
1500e4520c8bSEnji Cooper
1501e4520c8bSEnji Cooper  * Fix security issue ([CVE-2008-5077])
1502e4520c8bSEnji Cooper  * Merge FIPS 140-2 branch code.
1503e4520c8bSEnji Cooper
1504e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8g and OpenSSL 0.9.8h [28 May 2008]
1505e4520c8bSEnji Cooper
1506e4520c8bSEnji Cooper  * CryptoAPI ENGINE support.
1507e4520c8bSEnji Cooper  * Various precautionary measures.
1508e4520c8bSEnji Cooper  * Fix for bugs affecting certificate request creation.
1509e4520c8bSEnji Cooper  * Support for local machine keyset attribute in PKCS#12 files.
1510e4520c8bSEnji Cooper
1511e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8f and OpenSSL 0.9.8g [19 Oct 2007]
1512e4520c8bSEnji Cooper
1513e4520c8bSEnji Cooper  * Backport of CMS functionality to 0.9.8.
1514e4520c8bSEnji Cooper  * Fixes for bugs introduced with 0.9.8f.
1515e4520c8bSEnji Cooper
1516e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8e and OpenSSL 0.9.8f [11 Oct 2007]
1517e4520c8bSEnji Cooper
1518e4520c8bSEnji Cooper  * Add gcc 4.2 support.
1519e4520c8bSEnji Cooper  * Add support for AES and SSE2 assembly language optimization
1520e4520c8bSEnji Cooper    for VC++ build.
1521e4520c8bSEnji Cooper  * Support for RFC4507bis and server name extensions if explicitly
1522e4520c8bSEnji Cooper    selected at compile time.
1523e4520c8bSEnji Cooper  * DTLS improvements.
1524e4520c8bSEnji Cooper  * RFC4507bis support.
1525e4520c8bSEnji Cooper  * TLS Extensions support.
1526e4520c8bSEnji Cooper
1527e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8d and OpenSSL 0.9.8e [23 Feb 2007]
1528e4520c8bSEnji Cooper
1529e4520c8bSEnji Cooper  * Various ciphersuite selection fixes.
1530e4520c8bSEnji Cooper  * RFC3779 support.
1531e4520c8bSEnji Cooper
1532e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8c and OpenSSL 0.9.8d [28 Sep 2006]
1533e4520c8bSEnji Cooper
1534e4520c8bSEnji Cooper  * Introduce limits to prevent malicious key DoS  ([CVE-2006-2940])
1535e4520c8bSEnji Cooper  * Fix security issues [CVE-2006-2937], [CVE-2006-3737], [CVE-2006-4343]
1536e4520c8bSEnji Cooper  * Changes to ciphersuite selection algorithm
1537e4520c8bSEnji Cooper
1538e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8b and OpenSSL 0.9.8c [5 Sep 2006]
1539e4520c8bSEnji Cooper
1540e4520c8bSEnji Cooper  * Fix Daniel Bleichenbacher forged signature attack, [CVE-2006-4339]
1541e4520c8bSEnji Cooper  * New cipher Camellia
1542e4520c8bSEnji Cooper
1543e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8a and OpenSSL 0.9.8b [4 May 2006]
1544e4520c8bSEnji Cooper
1545e4520c8bSEnji Cooper  * Cipher string fixes.
1546e4520c8bSEnji Cooper  * Fixes for VC++ 2005.
1547e4520c8bSEnji Cooper  * Updated ECC cipher suite support.
1548e4520c8bSEnji Cooper  * New functions EVP_CIPHER_CTX_new() and EVP_CIPHER_CTX_free().
1549e4520c8bSEnji Cooper  * Zlib compression usage fixes.
1550e4520c8bSEnji Cooper  * Built in dynamic engine compilation support on Win32.
1551e4520c8bSEnji Cooper  * Fixes auto dynamic engine loading in Win32.
1552e4520c8bSEnji Cooper
1553e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8 and OpenSSL 0.9.8a [11 Oct 2005]
1554e4520c8bSEnji Cooper
1555e4520c8bSEnji Cooper  * Fix potential SSL 2.0 rollback ([CVE-2005-2969])
1556e4520c8bSEnji Cooper  * Extended Windows CE support
1557e4520c8bSEnji Cooper
1558e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.8 [5 Jul 2005]
1559e4520c8bSEnji Cooper
1560e4520c8bSEnji Cooper  * Major work on the BIGNUM library for higher efficiency and to
1561e4520c8bSEnji Cooper    make operations more streamlined and less contradictory.  This
1562e4520c8bSEnji Cooper    is the result of a major audit of the BIGNUM library.
1563e4520c8bSEnji Cooper  * Addition of BIGNUM functions for fields GF(2^m) and NIST
1564e4520c8bSEnji Cooper    curves, to support the Elliptic Crypto functions.
1565e4520c8bSEnji Cooper  * Major work on Elliptic Crypto; ECDH and ECDSA added, including
1566e4520c8bSEnji Cooper    the use through EVP, X509 and ENGINE.
1567e4520c8bSEnji Cooper  * New ASN.1 mini-compiler that's usable through the OpenSSL
1568e4520c8bSEnji Cooper    configuration file.
1569e4520c8bSEnji Cooper  * Added support for ASN.1 indefinite length constructed encoding.
1570e4520c8bSEnji Cooper  * New PKCS#12 'medium level' API to manipulate PKCS#12 files.
1571e4520c8bSEnji Cooper  * Complete rework of shared library construction and linking
1572e4520c8bSEnji Cooper    programs with shared or static libraries, through a separate
1573e4520c8bSEnji Cooper    Makefile.shared.
1574e4520c8bSEnji Cooper  * Rework of the passing of parameters from one Makefile to another.
1575e4520c8bSEnji Cooper  * Changed ENGINE framework to load dynamic engine modules
1576e4520c8bSEnji Cooper    automatically from specifically given directories.
1577e4520c8bSEnji Cooper  * New structure and ASN.1 functions for CertificatePair.
1578e4520c8bSEnji Cooper  * Changed the ZLIB compression method to be stateful.
1579e4520c8bSEnji Cooper  * Changed the key-generation and primality testing "progress"
1580e4520c8bSEnji Cooper    mechanism to take a structure that contains the ticker
1581e4520c8bSEnji Cooper    function and an argument.
1582e4520c8bSEnji Cooper  * New engine module: GMP (performs private key exponentiation).
1583e4520c8bSEnji Cooper  * New engine module: VIA PadLOck ACE extension in VIA C3
1584e4520c8bSEnji Cooper    Nehemiah processors.
1585e4520c8bSEnji Cooper  * Added support for IPv6 addresses in certificate extensions.
1586e4520c8bSEnji Cooper    See RFC 1884, section 2.2.
1587e4520c8bSEnji Cooper  * Added support for certificate policy mappings, policy
1588e4520c8bSEnji Cooper    constraints and name constraints.
1589e4520c8bSEnji Cooper  * Added support for multi-valued AVAs in the OpenSSL
1590e4520c8bSEnji Cooper    configuration file.
1591e4520c8bSEnji Cooper  * Added support for multiple certificates with the same subject
1592e4520c8bSEnji Cooper    in the 'openssl ca' index file.
1593e4520c8bSEnji Cooper  * Make it possible to create self-signed certificates using
1594e4520c8bSEnji Cooper    'openssl ca -selfsign'.
1595e4520c8bSEnji Cooper  * Make it possible to generate a serial number file with
1596e4520c8bSEnji Cooper    'openssl ca -create_serial'.
1597e4520c8bSEnji Cooper  * New binary search functions with extended functionality.
1598e4520c8bSEnji Cooper  * New BUF functions.
1599e4520c8bSEnji Cooper  * New STORE structure and library to provide an interface to all
1600e4520c8bSEnji Cooper    sorts of data repositories.  Supports storage of public and
1601e4520c8bSEnji Cooper    private keys, certificates, CRLs, numbers and arbitrary blobs.
1602e4520c8bSEnji Cooper    This library is unfortunately unfinished and unused within
1603e4520c8bSEnji Cooper    OpenSSL.
1604e4520c8bSEnji Cooper  * New control functions for the error stack.
1605e4520c8bSEnji Cooper  * Changed the PKCS#7 library to support one-pass S/MIME
1606e4520c8bSEnji Cooper    processing.
1607e4520c8bSEnji Cooper  * Added the possibility to compile without old deprecated
1608e4520c8bSEnji Cooper    functionality with the OPENSSL_NO_DEPRECATED macro or the
1609e4520c8bSEnji Cooper    'no-deprecated' argument to the config and Configure scripts.
1610e4520c8bSEnji Cooper  * Constification of all ASN.1 conversion functions, and other
1611e4520c8bSEnji Cooper    affected functions.
1612e4520c8bSEnji Cooper  * Improved platform support for PowerPC.
1613e4520c8bSEnji Cooper  * New FIPS 180-2 algorithms (SHA-224, -256, -384 and -512).
1614e4520c8bSEnji Cooper  * New X509_VERIFY_PARAM structure to support parameterisation
1615e4520c8bSEnji Cooper  of X.509 path validation.
1616e4520c8bSEnji Cooper  * Major overhaul of RC4 performance on Intel P4, IA-64 and
1617e4520c8bSEnji Cooper    AMD64.
1618e4520c8bSEnji Cooper  * Changed the Configure script to have some algorithms disabled
1619e4520c8bSEnji Cooper    by default.  Those can be explicitly enabled with the new
1620e4520c8bSEnji Cooper    argument form 'enable-xxx'.
1621e4520c8bSEnji Cooper  * Change the default digest in 'openssl' commands from MD5 to
1622e4520c8bSEnji Cooper    SHA-1.
1623e4520c8bSEnji Cooper  * Added support for DTLS.
1624e4520c8bSEnji Cooper  * New BIGNUM blinding.
1625e4520c8bSEnji Cooper  * Added support for the RSA-PSS encryption scheme
1626e4520c8bSEnji Cooper  * Added support for the RSA X.931 padding.
1627e4520c8bSEnji Cooper  * Added support for BSD sockets on NetWare.
1628e4520c8bSEnji Cooper  * Added support for files larger than 2GB.
1629e4520c8bSEnji Cooper  * Added initial support for Win64.
1630e4520c8bSEnji Cooper  * Added alternate pkg-config files.
1631e4520c8bSEnji Cooper
1632e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7l and OpenSSL 0.9.7m [23 Feb 2007]
1633e4520c8bSEnji Cooper
1634e4520c8bSEnji Cooper  * FIPS 1.1.1 module linking.
1635e4520c8bSEnji Cooper  * Various ciphersuite selection fixes.
1636e4520c8bSEnji Cooper
1637e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7k and OpenSSL 0.9.7l [28 Sep 2006]
1638e4520c8bSEnji Cooper
1639e4520c8bSEnji Cooper  * Introduce limits to prevent malicious key DoS  ([CVE-2006-2940])
1640e4520c8bSEnji Cooper  * Fix security issues [CVE-2006-2937], [CVE-2006-3737], [CVE-2006-4343]
1641e4520c8bSEnji Cooper
1642e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7j and OpenSSL 0.9.7k [5 Sep 2006]
1643e4520c8bSEnji Cooper
1644e4520c8bSEnji Cooper  * Fix Daniel Bleichenbacher forged signature attack, [CVE-2006-4339]
1645e4520c8bSEnji Cooper
1646e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7i and OpenSSL 0.9.7j [4 May 2006]
1647e4520c8bSEnji Cooper
1648e4520c8bSEnji Cooper  * Visual C++ 2005 fixes.
1649e4520c8bSEnji Cooper  * Update Windows build system for FIPS.
1650e4520c8bSEnji Cooper
1651e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7h and OpenSSL 0.9.7i [14 Oct 2005]
1652e4520c8bSEnji Cooper
1653e4520c8bSEnji Cooper  * Give EVP_MAX_MD_SIZE its old value, except for a FIPS build.
1654e4520c8bSEnji Cooper
1655e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.7h [11 Oct 2005]
1656e4520c8bSEnji Cooper
1657e4520c8bSEnji Cooper  * Fix SSL 2.0 Rollback ([CVE-2005-2969])
1658e4520c8bSEnji Cooper  * Allow use of fixed-length exponent on DSA signing
1659e4520c8bSEnji Cooper  * Default fixed-window RSA, DSA, DH private-key operations
1660e4520c8bSEnji Cooper
1661e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7f and OpenSSL 0.9.7g [11 Apr 2005]
1662e4520c8bSEnji Cooper
1663e4520c8bSEnji Cooper  * More compilation issues fixed.
1664e4520c8bSEnji Cooper  * Adaptation to more modern Kerberos API.
1665e4520c8bSEnji Cooper  * Enhanced or corrected configuration for Solaris64, Mingw and Cygwin.
1666e4520c8bSEnji Cooper  * Enhanced x86_64 assembler BIGNUM module.
1667e4520c8bSEnji Cooper  * More constification.
1668e4520c8bSEnji Cooper  * Added processing of proxy certificates (RFC 3820).
1669e4520c8bSEnji Cooper
1670e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7e and OpenSSL 0.9.7f [22 Mar 2005]
1671e4520c8bSEnji Cooper
1672e4520c8bSEnji Cooper  * Several compilation issues fixed.
1673e4520c8bSEnji Cooper  * Many memory allocation failure checks added.
1674e4520c8bSEnji Cooper  * Improved comparison of X509 Name type.
1675e4520c8bSEnji Cooper  * Mandatory basic checks on certificates.
1676e4520c8bSEnji Cooper  * Performance improvements.
1677e4520c8bSEnji Cooper
1678e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7d and OpenSSL 0.9.7e [25 Oct 2004]
1679e4520c8bSEnji Cooper
1680e4520c8bSEnji Cooper  * Fix race condition in CRL checking code.
1681e4520c8bSEnji Cooper  * Fixes to PKCS#7 (S/MIME) code.
1682e4520c8bSEnji Cooper
1683e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7c and OpenSSL 0.9.7d [17 Mar 2004]
1684e4520c8bSEnji Cooper
1685e4520c8bSEnji Cooper  * Security: Fix Kerberos ciphersuite SSL/TLS handshaking bug
1686e4520c8bSEnji Cooper  * Security: Fix null-pointer assignment in do_change_cipher_spec()
1687e4520c8bSEnji Cooper  * Allow multiple active certificates with same subject in CA index
1688e4520c8bSEnji Cooper  * Multiple X509 verification fixes
1689e4520c8bSEnji Cooper  * Speed up HMAC and other operations
1690e4520c8bSEnji Cooper
1691e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7b and OpenSSL 0.9.7c [30 Sep 2003]
1692e4520c8bSEnji Cooper
1693e4520c8bSEnji Cooper  * Security: fix various ASN1 parsing bugs.
1694e4520c8bSEnji Cooper  * New -ignore_err option to OCSP utility.
1695e4520c8bSEnji Cooper  * Various interop and bug fixes in S/MIME code.
1696e4520c8bSEnji Cooper  * SSL/TLS protocol fix for unrequested client certificates.
1697e4520c8bSEnji Cooper
1698e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7a and OpenSSL 0.9.7b [10 Apr 2003]
1699e4520c8bSEnji Cooper
1700e4520c8bSEnji Cooper  * Security: counter the Klima-Pokorny-Rosa extension of
1701e4520c8bSEnji Cooper    Bleichbacher's attack
1702e4520c8bSEnji Cooper  * Security: make RSA blinding default.
1703e4520c8bSEnji Cooper  * Configuration: Irix fixes, AIX fixes, better mingw support.
1704e4520c8bSEnji Cooper  * Support for new platforms: linux-ia64-ecc.
1705e4520c8bSEnji Cooper  * Build: shared library support fixes.
1706e4520c8bSEnji Cooper  * ASN.1: treat domainComponent correctly.
1707e4520c8bSEnji Cooper  * Documentation: fixes and additions.
1708e4520c8bSEnji Cooper
1709e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7 and OpenSSL 0.9.7a [19 Feb 2003]
1710e4520c8bSEnji Cooper
1711e4520c8bSEnji Cooper  * Security: Important security related bugfixes.
1712e4520c8bSEnji Cooper  * Enhanced compatibility with MIT Kerberos.
1713e4520c8bSEnji Cooper  * Can be built without the ENGINE framework.
1714e4520c8bSEnji Cooper  * IA32 assembler enhancements.
1715e4520c8bSEnji Cooper  * Support for new platforms: FreeBSD/IA64 and FreeBSD/Sparc64.
1716e4520c8bSEnji Cooper  * Configuration: the no-err option now works properly.
1717e4520c8bSEnji Cooper  * SSL/TLS: now handles manual certificate chain building.
1718e4520c8bSEnji Cooper  * SSL/TLS: certain session ID malfunctions corrected.
1719e4520c8bSEnji Cooper
1720e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.7 [30 Dec 2002]
1721e4520c8bSEnji Cooper
1722e4520c8bSEnji Cooper  * New library section OCSP.
1723e4520c8bSEnji Cooper  * Complete rewrite of ASN1 code.
1724e4520c8bSEnji Cooper  * CRL checking in verify code and openssl utility.
1725e4520c8bSEnji Cooper  * Extension copying in 'ca' utility.
1726e4520c8bSEnji Cooper  * Flexible display options in 'ca' utility.
1727e4520c8bSEnji Cooper  * Provisional support for international characters with UTF8.
1728e4520c8bSEnji Cooper  * Support for external crypto devices ('engine') is no longer
1729e4520c8bSEnji Cooper    a separate distribution.
1730e4520c8bSEnji Cooper  * New elliptic curve library section.
1731e4520c8bSEnji Cooper  * New AES (Rijndael) library section.
1732e4520c8bSEnji Cooper  * Support for new platforms: Windows CE, Tandem OSS, A/UX, AIX 64-bit,
1733e4520c8bSEnji Cooper    Linux x86_64, Linux 64-bit on Sparc v9
1734e4520c8bSEnji Cooper  * Extended support for some platforms: VxWorks
1735e4520c8bSEnji Cooper  * Enhanced support for shared libraries.
1736e4520c8bSEnji Cooper  * Now only builds PIC code when shared library support is requested.
1737e4520c8bSEnji Cooper  * Support for pkg-config.
1738e4520c8bSEnji Cooper  * Lots of new manuals.
1739e4520c8bSEnji Cooper  * Makes symbolic links to or copies of manuals to cover all described
1740e4520c8bSEnji Cooper    functions.
1741e4520c8bSEnji Cooper  * Change DES API to clean up the namespace (some applications link also
1742e4520c8bSEnji Cooper    against libdes providing similar functions having the same name).
1743e4520c8bSEnji Cooper    Provide macros for backward compatibility (will be removed in the
1744e4520c8bSEnji Cooper    future).
1745e4520c8bSEnji Cooper  * Unify handling of cryptographic algorithms (software and engine)
1746e4520c8bSEnji Cooper    to be available via EVP routines for asymmetric and symmetric ciphers.
1747e4520c8bSEnji Cooper  * NCONF: new configuration handling routines.
1748e4520c8bSEnji Cooper  * Change API to use more 'const' modifiers to improve error checking
1749e4520c8bSEnji Cooper    and help optimizers.
1750e4520c8bSEnji Cooper  * Finally remove references to RSAref.
1751e4520c8bSEnji Cooper  * Reworked parts of the BIGNUM code.
1752e4520c8bSEnji Cooper  * Support for new engines: Broadcom ubsec, Accelerated Encryption
1753e4520c8bSEnji Cooper    Processing, IBM 4758.
1754e4520c8bSEnji Cooper  * A few new engines added in the demos area.
1755e4520c8bSEnji Cooper  * Extended and corrected OID (object identifier) table.
1756e4520c8bSEnji Cooper  * PRNG: query at more locations for a random device, automatic query for
1757e4520c8bSEnji Cooper    EGD style random sources at several locations.
1758e4520c8bSEnji Cooper  * SSL/TLS: allow optional cipher choice according to server's preference.
1759e4520c8bSEnji Cooper  * SSL/TLS: allow server to explicitly set new session ids.
1760e4520c8bSEnji Cooper  * SSL/TLS: support Kerberos cipher suites (RFC2712).
1761e4520c8bSEnji Cooper    Only supports MIT Kerberos for now.
1762e4520c8bSEnji Cooper  * SSL/TLS: allow more precise control of renegotiations and sessions.
1763e4520c8bSEnji Cooper  * SSL/TLS: add callback to retrieve SSL/TLS messages.
1764e4520c8bSEnji Cooper  * SSL/TLS: support AES cipher suites (RFC3268).
1765e4520c8bSEnji Cooper
1766e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6j and OpenSSL 0.9.6k [30 Sep 2003]
1767e4520c8bSEnji Cooper
1768e4520c8bSEnji Cooper  * Security: fix various ASN1 parsing bugs.
1769e4520c8bSEnji Cooper  * SSL/TLS protocol fix for unrequested client certificates.
1770e4520c8bSEnji Cooper
1771e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6i and OpenSSL 0.9.6j [10 Apr 2003]
1772e4520c8bSEnji Cooper
1773e4520c8bSEnji Cooper  * Security: counter the Klima-Pokorny-Rosa extension of
1774e4520c8bSEnji Cooper    Bleichbacher's attack
1775e4520c8bSEnji Cooper  * Security: make RSA blinding default.
1776e4520c8bSEnji Cooper  * Build: shared library support fixes.
1777e4520c8bSEnji Cooper
1778e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6h and OpenSSL 0.9.6i [19 Feb 2003]
1779e4520c8bSEnji Cooper
1780e4520c8bSEnji Cooper  * Important security related bugfixes.
1781e4520c8bSEnji Cooper
1782e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6g and OpenSSL 0.9.6h [5 Dec 2002]
1783e4520c8bSEnji Cooper
1784e4520c8bSEnji Cooper  * New configuration targets for Tandem OSS and A/UX.
1785e4520c8bSEnji Cooper  * New OIDs for Microsoft attributes.
1786e4520c8bSEnji Cooper  * Better handling of SSL session caching.
1787e4520c8bSEnji Cooper  * Better comparison of distinguished names.
1788e4520c8bSEnji Cooper  * Better handling of shared libraries in a mixed GNU/non-GNU environment.
1789e4520c8bSEnji Cooper  * Support assembler code with Borland C.
1790e4520c8bSEnji Cooper  * Fixes for length problems.
1791e4520c8bSEnji Cooper  * Fixes for uninitialised variables.
1792e4520c8bSEnji Cooper  * Fixes for memory leaks, some unusual crashes and some race conditions.
1793e4520c8bSEnji Cooper  * Fixes for smaller building problems.
1794e4520c8bSEnji Cooper  * Updates of manuals, FAQ and other instructive documents.
1795e4520c8bSEnji Cooper
1796e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6f and OpenSSL 0.9.6g [9 Aug 2002]
1797e4520c8bSEnji Cooper
1798e4520c8bSEnji Cooper  * Important building fixes on Unix.
1799e4520c8bSEnji Cooper
1800e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6e and OpenSSL 0.9.6f [8 Aug 2002]
1801e4520c8bSEnji Cooper
1802e4520c8bSEnji Cooper  * Various important bugfixes.
1803e4520c8bSEnji Cooper
1804e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6d and OpenSSL 0.9.6e [30 Jul 2002]
1805e4520c8bSEnji Cooper
1806e4520c8bSEnji Cooper  * Important security related bugfixes.
1807e4520c8bSEnji Cooper  * Various SSL/TLS library bugfixes.
1808e4520c8bSEnji Cooper
1809e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6c and OpenSSL 0.9.6d [9 May 2002]
1810e4520c8bSEnji Cooper
1811e4520c8bSEnji Cooper  * Various SSL/TLS library bugfixes.
1812e4520c8bSEnji Cooper  * Fix DH parameter generation for 'non-standard' generators.
1813e4520c8bSEnji Cooper
1814e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6b and OpenSSL 0.9.6c [21 Dec 2001]
1815e4520c8bSEnji Cooper
1816e4520c8bSEnji Cooper  * Various SSL/TLS library bugfixes.
1817e4520c8bSEnji Cooper  * BIGNUM library fixes.
1818e4520c8bSEnji Cooper  * RSA OAEP and random number generation fixes.
1819e4520c8bSEnji Cooper  * Object identifiers corrected and added.
1820e4520c8bSEnji Cooper  * Add assembler BN routines for IA64.
1821e4520c8bSEnji Cooper  * Add support for OS/390 Unix, UnixWare with gcc, OpenUNIX 8,
1822e4520c8bSEnji Cooper    MIPS Linux; shared library support for Irix, HP-UX.
1823e4520c8bSEnji Cooper  * Add crypto accelerator support for AEP, Baltimore SureWare,
1824e4520c8bSEnji Cooper    Broadcom and Cryptographic Appliance's keyserver
1825e4520c8bSEnji Cooper    [in 0.9.6c-engine release].
1826e4520c8bSEnji Cooper
1827e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6a and OpenSSL 0.9.6b [9 Jul 2001]
1828e4520c8bSEnji Cooper
1829e4520c8bSEnji Cooper  * Security fix: PRNG improvements.
1830e4520c8bSEnji Cooper  * Security fix: RSA OAEP check.
1831e4520c8bSEnji Cooper  * Security fix: Reinsert and fix countermeasure to Bleichbacher's
1832e4520c8bSEnji Cooper    attack.
1833e4520c8bSEnji Cooper  * MIPS bug fix in BIGNUM.
1834e4520c8bSEnji Cooper  * Bug fix in "openssl enc".
1835e4520c8bSEnji Cooper  * Bug fix in X.509 printing routine.
1836e4520c8bSEnji Cooper  * Bug fix in DSA verification routine and DSA S/MIME verification.
1837e4520c8bSEnji Cooper  * Bug fix to make PRNG thread-safe.
1838e4520c8bSEnji Cooper  * Bug fix in RAND_file_name().
1839e4520c8bSEnji Cooper  * Bug fix in compatibility mode trust settings.
1840e4520c8bSEnji Cooper  * Bug fix in blowfish EVP.
1841e4520c8bSEnji Cooper  * Increase default size for BIO buffering filter.
1842e4520c8bSEnji Cooper  * Compatibility fixes in some scripts.
1843e4520c8bSEnji Cooper
1844e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.6a [5 Apr 2001]
1845e4520c8bSEnji Cooper
1846e4520c8bSEnji Cooper  * Security fix: change behavior of OpenSSL to avoid using
1847e4520c8bSEnji Cooper    environment variables when running as root.
1848e4520c8bSEnji Cooper  * Security fix: check the result of RSA-CRT to reduce the
1849e4520c8bSEnji Cooper    possibility of deducing the private key from an incorrectly
1850e4520c8bSEnji Cooper    calculated signature.
1851e4520c8bSEnji Cooper  * Security fix: prevent Bleichenbacher's DSA attack.
1852e4520c8bSEnji Cooper  * Security fix: Zero the premaster secret after deriving the
1853e4520c8bSEnji Cooper    master secret in DH ciphersuites.
1854e4520c8bSEnji Cooper  * Reimplement SSL_peek(), which had various problems.
1855e4520c8bSEnji Cooper  * Compatibility fix: the function des_encrypt() renamed to
1856e4520c8bSEnji Cooper    des_encrypt1() to avoid clashes with some Unixen libc.
1857e4520c8bSEnji Cooper  * Bug fixes for Win32, HP/UX and Irix.
1858e4520c8bSEnji Cooper  * Bug fixes in BIGNUM, SSL, PKCS#7, PKCS#12, X.509, CONF and
1859e4520c8bSEnji Cooper    memory checking routines.
1860e4520c8bSEnji Cooper  * Bug fixes for RSA operations in threaded environments.
1861e4520c8bSEnji Cooper  * Bug fixes in misc. openssl applications.
1862e4520c8bSEnji Cooper  * Remove a few potential memory leaks.
1863e4520c8bSEnji Cooper  * Add tighter checks of BIGNUM routines.
1864e4520c8bSEnji Cooper  * Shared library support has been reworked for generality.
1865e4520c8bSEnji Cooper  * More documentation.
1866e4520c8bSEnji Cooper  * New function BN_rand_range().
1867e4520c8bSEnji Cooper  * Add "-rand" option to openssl s_client and s_server.
1868e4520c8bSEnji Cooper
1869e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.5a and OpenSSL 0.9.6 [10 Oct 2000]
1870e4520c8bSEnji Cooper
1871e4520c8bSEnji Cooper  * Some documentation for BIO and SSL libraries.
1872e4520c8bSEnji Cooper  * Enhanced chain verification using key identifiers.
1873e4520c8bSEnji Cooper  * New sign and verify options to 'dgst' application.
1874e4520c8bSEnji Cooper  * Support for DER and PEM encoded messages in 'smime' application.
1875e4520c8bSEnji Cooper  * New 'rsautl' application, low-level RSA utility.
1876e4520c8bSEnji Cooper  * MD4 now included.
1877e4520c8bSEnji Cooper  * Bugfix for SSL rollback padding check.
1878e4520c8bSEnji Cooper  * Support for external crypto devices [1].
1879e4520c8bSEnji Cooper  * Enhanced EVP interface.
1880e4520c8bSEnji Cooper
1881e4520c8bSEnji Cooper  [1] The support for external crypto devices is currently a separate
1882e4520c8bSEnji Cooper      distribution.  See the file README-Engine.md.
1883e4520c8bSEnji Cooper
1884e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.5 and OpenSSL 0.9.5a [1 Apr 2000]
1885e4520c8bSEnji Cooper
1886e4520c8bSEnji Cooper  * Bug fixes for Win32, SuSE Linux, NeXTSTEP and FreeBSD 2.2.8
1887e4520c8bSEnji Cooper  * Shared library support for HPUX and Solaris-gcc
1888e4520c8bSEnji Cooper  * Support of Linux/IA64
1889e4520c8bSEnji Cooper  * Assembler support for Mingw32
1890e4520c8bSEnji Cooper  * New 'rand' application
1891e4520c8bSEnji Cooper  * New way to check for existence of algorithms from scripts
1892e4520c8bSEnji Cooper
1893e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.4 and OpenSSL 0.9.5 [25 May 2000]
1894e4520c8bSEnji Cooper
1895e4520c8bSEnji Cooper  * S/MIME support in new 'smime' command
1896e4520c8bSEnji Cooper  * Documentation for the OpenSSL command line application
1897e4520c8bSEnji Cooper  * Automation of 'req' application
1898e4520c8bSEnji Cooper  * Fixes to make s_client, s_server work under Windows
1899e4520c8bSEnji Cooper  * Support for multiple fieldnames in SPKACs
1900e4520c8bSEnji Cooper  * New SPKAC command line utility and associated library functions
1901e4520c8bSEnji Cooper  * Options to allow passwords to be obtained from various sources
1902e4520c8bSEnji Cooper  * New public key PEM format and options to handle it
1903e4520c8bSEnji Cooper  * Many other fixes and enhancements to command line utilities
1904e4520c8bSEnji Cooper  * Usable certificate chain verification
1905e4520c8bSEnji Cooper  * Certificate purpose checking
1906e4520c8bSEnji Cooper  * Certificate trust settings
1907e4520c8bSEnji Cooper  * Support of authority information access extension
1908e4520c8bSEnji Cooper  * Extensions in certificate requests
1909e4520c8bSEnji Cooper  * Simplified X509 name and attribute routines
1910e4520c8bSEnji Cooper  * Initial (incomplete) support for international character sets
1911e4520c8bSEnji Cooper  * New DH_METHOD, DSA_METHOD and enhanced RSA_METHOD
1912e4520c8bSEnji Cooper  * Read only memory BIOs and simplified creation function
1913e4520c8bSEnji Cooper  * TLS/SSL protocol bugfixes: Accept TLS 'client hello' in SSL 3.0
1914e4520c8bSEnji Cooper    record; allow fragmentation and interleaving of handshake and other
1915e4520c8bSEnji Cooper    data
1916e4520c8bSEnji Cooper  * TLS/SSL code now "tolerates" MS SGC
1917e4520c8bSEnji Cooper  * Work around for Netscape client certificate hang bug
1918e4520c8bSEnji Cooper  * RSA_NULL option that removes RSA patent code but keeps other
1919e4520c8bSEnji Cooper    RSA functionality
1920e4520c8bSEnji Cooper  * Memory leak detection now allows applications to add extra information
1921e4520c8bSEnji Cooper    via a per-thread stack
1922e4520c8bSEnji Cooper  * PRNG robustness improved
1923e4520c8bSEnji Cooper  * EGD support
1924e4520c8bSEnji Cooper  * BIGNUM library bug fixes
1925e4520c8bSEnji Cooper  * Faster DSA parameter generation
1926e4520c8bSEnji Cooper  * Enhanced support for Alpha Linux
1927e4520c8bSEnji Cooper  * Experimental macOS support
1928e4520c8bSEnji Cooper
1929e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.3 and OpenSSL 0.9.4 [9 Aug 1999]
1930e4520c8bSEnji Cooper
1931e4520c8bSEnji Cooper  * Transparent support for PKCS#8 format private keys: these are used
1932e4520c8bSEnji Cooper    by several software packages and are more secure than the standard
1933e4520c8bSEnji Cooper    form
1934e4520c8bSEnji Cooper  * PKCS#5 v2.0 implementation
1935e4520c8bSEnji Cooper  * Password callbacks have a new void * argument for application data
1936e4520c8bSEnji Cooper  * Avoid various memory leaks
1937e4520c8bSEnji Cooper  * New pipe-like BIO that allows using the SSL library when actual I/O
1938e4520c8bSEnji Cooper    must be handled by the application (BIO pair)
1939e4520c8bSEnji Cooper
1940e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.2b and OpenSSL 0.9.3 [24 May 1999]
1941e4520c8bSEnji Cooper
1942e4520c8bSEnji Cooper  * Lots of enhancements and cleanups to the Configuration mechanism
1943e4520c8bSEnji Cooper  * RSA OEAP related fixes
1944e4520c8bSEnji Cooper  * Added "openssl ca -revoke" option for revoking a certificate
1945e4520c8bSEnji Cooper  * Source cleanups: const correctness, type-safe stacks and ASN.1 SETs
1946e4520c8bSEnji Cooper  * Source tree cleanups: removed lots of obsolete files
1947e4520c8bSEnji Cooper  * Thawte SXNet, certificate policies and CRL distribution points
1948e4520c8bSEnji Cooper    extension support
1949e4520c8bSEnji Cooper  * Preliminary (experimental) S/MIME support
1950e4520c8bSEnji Cooper  * Support for ASN.1 UTF8String and VisibleString
1951e4520c8bSEnji Cooper  * Full integration of PKCS#12 code
1952e4520c8bSEnji Cooper  * Sparc assembler bignum implementation, optimized hash functions
1953e4520c8bSEnji Cooper  * Option to disable selected ciphers
1954e4520c8bSEnji Cooper
1955e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.1c and OpenSSL 0.9.2b [22 Mar 1999]
1956e4520c8bSEnji Cooper
1957e4520c8bSEnji Cooper  * Fixed a security hole related to session resumption
1958e4520c8bSEnji Cooper  * Fixed RSA encryption routines for the p < q case
1959e4520c8bSEnji Cooper  * "ALL" in cipher lists now means "everything except NULL ciphers"
1960e4520c8bSEnji Cooper  * Support for Triple-DES CBCM cipher
1961e4520c8bSEnji Cooper  * Support of Optimal Asymmetric Encryption Padding (OAEP) for RSA
1962e4520c8bSEnji Cooper  * First support for new TLSv1 ciphers
1963e4520c8bSEnji Cooper  * Added a few new BIOs (syslog BIO, reliable BIO)
1964e4520c8bSEnji Cooper  * Extended support for DSA certificate/keys.
1965e4520c8bSEnji Cooper  * Extended support for Certificate Signing Requests (CSR)
1966e4520c8bSEnji Cooper  * Initial support for X.509v3 extensions
1967e4520c8bSEnji Cooper  * Extended support for compression inside the SSL record layer
1968e4520c8bSEnji Cooper  * Overhauled Win32 builds
1969e4520c8bSEnji Cooper  * Cleanups and fixes to the Big Number (BN) library
1970e4520c8bSEnji Cooper  * Support for ASN.1 GeneralizedTime
197129536654SEnji Cooper  * Split ASN.1 SETs from SEQUENCEs
1972e4520c8bSEnji Cooper  * ASN1 and PEM support for Netscape Certificate Sequences
1973e4520c8bSEnji Cooper  * Overhauled Perl interface
1974e4520c8bSEnji Cooper  * Lots of source tree cleanups.
1975e4520c8bSEnji Cooper  * Lots of memory leak fixes.
1976e4520c8bSEnji Cooper  * Lots of bug fixes.
1977e4520c8bSEnji Cooper
1978e4520c8bSEnji Cooper### Major changes between SSLeay 0.9.0b and OpenSSL 0.9.1c [23 Dec 1998]
1979e4520c8bSEnji Cooper
1980e4520c8bSEnji Cooper  * Integration of the popular NO_RSA/NO_DSA patches
1981e4520c8bSEnji Cooper  * Initial support for compression inside the SSL record layer
1982e4520c8bSEnji Cooper  * Added BIO proxy and filtering functionality
1983e4520c8bSEnji Cooper  * Extended Big Number (BN) library
1984e4520c8bSEnji Cooper  * Added RIPE MD160 message digest
1985e4520c8bSEnji Cooper  * Added support for RC2/64bit cipher
1986e4520c8bSEnji Cooper  * Extended ASN.1 parser routines
1987e4520c8bSEnji Cooper  * Adjustments of the source tree for CVS
1988e4520c8bSEnji Cooper  * Support for various new platforms
1989e4520c8bSEnji Cooper
1990e4520c8bSEnji Cooper<!-- Links -->
1991808413daSEnji Cooper[CVE-2026-22796]: https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796
1992808413daSEnji Cooper[CVE-2026-22795]: https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795
1993808413daSEnji Cooper[CVE-2025-69421]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421
1994808413daSEnji Cooper[CVE-2025-69420]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420
1995808413daSEnji Cooper[CVE-2025-69419]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419
1996808413daSEnji Cooper[CVE-2025-69418]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418
1997808413daSEnji Cooper[CVE-2025-68160]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160
1998808413daSEnji Cooper[CVE-2025-66199]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199
1999808413daSEnji Cooper[CVE-2025-15469]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15469
2000808413daSEnji Cooper[CVE-2025-15468]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468
2001808413daSEnji Cooper[CVE-2025-15467]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467
2002808413daSEnji Cooper[CVE-2025-11187]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187
20038e12a5c4SEnji Cooper[CVE-2025-9232]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-9232
20048e12a5c4SEnji Cooper[CVE-2025-9231]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-9231
20058e12a5c4SEnji Cooper[CVE-2025-9230]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-9230
20061095efe4SPierre Pronchery[CVE-2025-4575]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-4575
20071c342803SEnji Cooper[CVE-2024-13176]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-13176
20081c342803SEnji Cooper[CVE-2024-9143]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-9143
2009108164cfSGordon Tetlow[CVE-2024-6119]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-6119
2010108164cfSGordon Tetlow[CVE-2024-5535]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-5535
20111070e7dcSEnji Cooper[CVE-2024-4741]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4741
20121070e7dcSEnji Cooper[CVE-2024-4603]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4603
20131070e7dcSEnji Cooper[CVE-2024-2511]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-2511
20149dd13e84SCy Schubert[CVE-2024-0727]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-0727
20159dd13e84SCy Schubert[CVE-2023-6237]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-6237
20169dd13e84SCy Schubert[CVE-2023-6129]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-6129
20179dd13e84SCy Schubert[CVE-2023-5678]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-5678
2018825caf7eSEd Maste[CVE-2023-5363]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-5363
2019315108b8SPierre Pronchery[CVE-2023-4807]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-4807
2020cf2fc1b0SPierre Pronchery[CVE-2023-3817]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3817
2021cf2fc1b0SPierre Pronchery[CVE-2023-3446]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446
2022cf2fc1b0SPierre Pronchery[CVE-2023-2975]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975
2023b84c4564SPierre Pronchery[CVE-2023-2650]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650
2024b84c4564SPierre Pronchery[CVE-2023-1255]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255
2025b84c4564SPierre Pronchery[CVE-2023-0466]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0466
2026b84c4564SPierre Pronchery[CVE-2023-0465]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0465
2027b84c4564SPierre Pronchery[CVE-2023-0464]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0464
2028e4520c8bSEnji Cooper[CVE-2023-0401]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0401
2029e4520c8bSEnji Cooper[CVE-2023-0286]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0286
2030e4520c8bSEnji Cooper[CVE-2023-0217]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0217
2031e4520c8bSEnji Cooper[CVE-2023-0216]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0216
2032e4520c8bSEnji Cooper[CVE-2023-0215]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0215
2033e4520c8bSEnji Cooper[CVE-2022-4450]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-4450
2034e4520c8bSEnji Cooper[CVE-2022-4304]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-4304
2035e4520c8bSEnji Cooper[CVE-2022-4203]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-4203
2036e4520c8bSEnji Cooper[CVE-2022-3996]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-3996
2037e4520c8bSEnji Cooper[CVE-2022-2274]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-2274
2038b84c4564SPierre Pronchery[CVE-2022-2097]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-2097
2039e4520c8bSEnji Cooper[CVE-2020-1971]: https://www.openssl.org/news/vulnerabilities.html#CVE-2020-1971
2040e4520c8bSEnji Cooper[CVE-2020-1967]: https://www.openssl.org/news/vulnerabilities.html#CVE-2020-1967
2041e4520c8bSEnji Cooper[CVE-2019-1563]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1563
2042e4520c8bSEnji Cooper[CVE-2019-1559]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1559
2043e4520c8bSEnji Cooper[CVE-2019-1552]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1552
2044e4520c8bSEnji Cooper[CVE-2019-1551]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1551
2045e4520c8bSEnji Cooper[CVE-2019-1549]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1549
2046e4520c8bSEnji Cooper[CVE-2019-1547]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1547
2047e4520c8bSEnji Cooper[CVE-2019-1543]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1543
2048e4520c8bSEnji Cooper[CVE-2018-5407]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-5407
2049e4520c8bSEnji Cooper[CVE-2018-0739]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0739
2050e4520c8bSEnji Cooper[CVE-2018-0737]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0737
2051e4520c8bSEnji Cooper[CVE-2018-0735]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0735
2052e4520c8bSEnji Cooper[CVE-2018-0734]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0734
2053e4520c8bSEnji Cooper[CVE-2018-0733]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0733
2054e4520c8bSEnji Cooper[CVE-2018-0732]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0732
2055e4520c8bSEnji Cooper[CVE-2017-3738]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3738
2056e4520c8bSEnji Cooper[CVE-2017-3737]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3737
2057e4520c8bSEnji Cooper[CVE-2017-3736]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3736
2058e4520c8bSEnji Cooper[CVE-2017-3735]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3735
2059e4520c8bSEnji Cooper[CVE-2017-3733]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3733
2060e4520c8bSEnji Cooper[CVE-2017-3732]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3732
2061e4520c8bSEnji Cooper[CVE-2017-3731]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3731
2062e4520c8bSEnji Cooper[CVE-2017-3730]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3730
2063e4520c8bSEnji Cooper[CVE-2016-7055]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-7055
2064e4520c8bSEnji Cooper[CVE-2016-7054]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-7054
2065e4520c8bSEnji Cooper[CVE-2016-7053]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-7053
2066e4520c8bSEnji Cooper[CVE-2016-7052]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-7052
2067e4520c8bSEnji Cooper[CVE-2016-6309]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6309
2068e4520c8bSEnji Cooper[CVE-2016-6308]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6308
2069e4520c8bSEnji Cooper[CVE-2016-6307]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6307
2070e4520c8bSEnji Cooper[CVE-2016-6306]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6306
2071e4520c8bSEnji Cooper[CVE-2016-6305]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6305
2072e4520c8bSEnji Cooper[CVE-2016-6304]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6304
2073e4520c8bSEnji Cooper[CVE-2016-6303]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6303
2074e4520c8bSEnji Cooper[CVE-2016-6302]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6302
2075e4520c8bSEnji Cooper[CVE-2016-2183]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2183
2076e4520c8bSEnji Cooper[CVE-2016-2182]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2182
2077e4520c8bSEnji Cooper[CVE-2016-2181]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2181
2078e4520c8bSEnji Cooper[CVE-2016-2180]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2180
2079e4520c8bSEnji Cooper[CVE-2016-2179]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2179
2080e4520c8bSEnji Cooper[CVE-2016-2178]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2178
2081e4520c8bSEnji Cooper[CVE-2016-2177]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2177
2082e4520c8bSEnji Cooper[CVE-2016-2176]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2176
2083e4520c8bSEnji Cooper[CVE-2016-2109]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2109
2084e4520c8bSEnji Cooper[CVE-2016-2107]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2107
2085e4520c8bSEnji Cooper[CVE-2016-2106]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2106
2086e4520c8bSEnji Cooper[CVE-2016-2105]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2105
2087e4520c8bSEnji Cooper[CVE-2016-0800]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0800
2088e4520c8bSEnji Cooper[CVE-2016-0799]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0799
2089e4520c8bSEnji Cooper[CVE-2016-0798]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0798
2090e4520c8bSEnji Cooper[CVE-2016-0797]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0797
2091e4520c8bSEnji Cooper[CVE-2016-0705]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0705
2092e4520c8bSEnji Cooper[CVE-2016-0702]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0702
2093e4520c8bSEnji Cooper[CVE-2016-0701]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0701
2094e4520c8bSEnji Cooper[CVE-2015-3197]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-3197
2095e4520c8bSEnji Cooper[CVE-2015-3196]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-3196
2096e4520c8bSEnji Cooper[CVE-2015-3195]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-3195
2097e4520c8bSEnji Cooper[CVE-2015-3194]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-3194
2098e4520c8bSEnji Cooper[CVE-2015-3193]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-3193
2099e4520c8bSEnji Cooper[CVE-2015-1793]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1793
2100e4520c8bSEnji Cooper[CVE-2015-1792]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1792
2101e4520c8bSEnji Cooper[CVE-2015-1791]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1791
2102e4520c8bSEnji Cooper[CVE-2015-1790]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1790
2103e4520c8bSEnji Cooper[CVE-2015-1789]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1789
2104e4520c8bSEnji Cooper[CVE-2015-1788]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1788
2105e4520c8bSEnji Cooper[CVE-2015-1787]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1787
2106e4520c8bSEnji Cooper[CVE-2015-0293]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0293
2107e4520c8bSEnji Cooper[CVE-2015-0291]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0291
2108e4520c8bSEnji Cooper[CVE-2015-0290]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0290
2109e4520c8bSEnji Cooper[CVE-2015-0289]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0289
2110e4520c8bSEnji Cooper[CVE-2015-0288]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0288
2111e4520c8bSEnji Cooper[CVE-2015-0287]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0287
2112e4520c8bSEnji Cooper[CVE-2015-0286]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0286
2113e4520c8bSEnji Cooper[CVE-2015-0285]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0285
2114e4520c8bSEnji Cooper[CVE-2015-0209]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0209
2115e4520c8bSEnji Cooper[CVE-2015-0208]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0208
2116e4520c8bSEnji Cooper[CVE-2015-0207]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0207
2117e4520c8bSEnji Cooper[CVE-2015-0206]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0206
2118e4520c8bSEnji Cooper[CVE-2015-0205]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0205
2119e4520c8bSEnji Cooper[CVE-2015-0204]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0204
2120e4520c8bSEnji Cooper[CVE-2014-8275]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-8275
2121e4520c8bSEnji Cooper[CVE-2014-5139]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-5139
2122e4520c8bSEnji Cooper[CVE-2014-3572]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3572
2123e4520c8bSEnji Cooper[CVE-2014-3571]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3571
2124e4520c8bSEnji Cooper[CVE-2014-3570]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3570
2125e4520c8bSEnji Cooper[CVE-2014-3569]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3569
2126e4520c8bSEnji Cooper[CVE-2014-3568]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3568
2127e4520c8bSEnji Cooper[CVE-2014-3567]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3567
2128e4520c8bSEnji Cooper[CVE-2014-3566]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3566
2129e4520c8bSEnji Cooper[CVE-2014-3513]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3513
2130e4520c8bSEnji Cooper[CVE-2014-3512]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3512
2131e4520c8bSEnji Cooper[CVE-2014-3511]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3511
2132e4520c8bSEnji Cooper[CVE-2014-3510]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3510
2133e4520c8bSEnji Cooper[CVE-2014-3509]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3509
2134e4520c8bSEnji Cooper[CVE-2014-3508]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3508
2135e4520c8bSEnji Cooper[CVE-2014-3507]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3507
2136e4520c8bSEnji Cooper[CVE-2014-3506]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3506
2137e4520c8bSEnji Cooper[CVE-2014-3505]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3505
2138e4520c8bSEnji Cooper[CVE-2014-3470]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3470
2139e4520c8bSEnji Cooper[CVE-2014-0224]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0224
2140e4520c8bSEnji Cooper[CVE-2014-0221]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0221
2141e4520c8bSEnji Cooper[CVE-2014-0198]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0198
2142e4520c8bSEnji Cooper[CVE-2014-0195]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0195
2143e4520c8bSEnji Cooper[CVE-2014-0160]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0160
2144e4520c8bSEnji Cooper[CVE-2014-0076]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0076
2145e4520c8bSEnji Cooper[CVE-2013-6450]: https://www.openssl.org/news/vulnerabilities.html#CVE-2013-6450
2146e4520c8bSEnji Cooper[CVE-2013-6449]: https://www.openssl.org/news/vulnerabilities.html#CVE-2013-6449
2147e4520c8bSEnji Cooper[CVE-2013-4353]: https://www.openssl.org/news/vulnerabilities.html#CVE-2013-4353
2148e4520c8bSEnji Cooper[CVE-2013-0169]: https://www.openssl.org/news/vulnerabilities.html#CVE-2013-0169
2149e4520c8bSEnji Cooper[CVE-2013-0166]: https://www.openssl.org/news/vulnerabilities.html#CVE-2013-0166
2150e4520c8bSEnji Cooper[CVE-2012-2686]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-2686
2151e4520c8bSEnji Cooper[CVE-2012-2333]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-2333
2152e4520c8bSEnji Cooper[CVE-2012-2110]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-2110
2153e4520c8bSEnji Cooper[CVE-2012-0884]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-0884
2154e4520c8bSEnji Cooper[CVE-2012-0050]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-0050
2155e4520c8bSEnji Cooper[CVE-2012-0027]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-0027
2156e4520c8bSEnji Cooper[CVE-2011-4619]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-4619
2157e4520c8bSEnji Cooper[CVE-2011-4577]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-4577
2158e4520c8bSEnji Cooper[CVE-2011-4576]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-4576
2159e4520c8bSEnji Cooper[CVE-2011-4108]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-4108
2160e4520c8bSEnji Cooper[CVE-2011-3210]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-3210
2161e4520c8bSEnji Cooper[CVE-2011-3207]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-3207
2162e4520c8bSEnji Cooper[CVE-2011-0014]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-0014
2163e4520c8bSEnji Cooper[CVE-2010-5298]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-5298
2164e4520c8bSEnji Cooper[CVE-2010-4252]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-4252
2165e4520c8bSEnji Cooper[CVE-2010-4180]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-4180
2166e4520c8bSEnji Cooper[CVE-2010-3864]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-3864
2167e4520c8bSEnji Cooper[CVE-2010-2939]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-2939
2168e4520c8bSEnji Cooper[CVE-2010-1633]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-1633
2169e4520c8bSEnji Cooper[CVE-2010-0740]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-0740
2170e4520c8bSEnji Cooper[CVE-2010-0433]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-0433
2171e4520c8bSEnji Cooper[CVE-2009-3555]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-3555
2172e4520c8bSEnji Cooper[CVE-2009-0789]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-0789
2173e4520c8bSEnji Cooper[CVE-2009-0591]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-0591
2174e4520c8bSEnji Cooper[CVE-2009-0590]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-0590
2175e4520c8bSEnji Cooper[CVE-2008-5077]: https://www.openssl.org/news/vulnerabilities.html#CVE-2008-5077
2176e4520c8bSEnji Cooper[CVE-2006-4343]: https://www.openssl.org/news/vulnerabilities.html#CVE-2006-4343
2177e4520c8bSEnji Cooper[CVE-2006-4339]: https://www.openssl.org/news/vulnerabilities.html#CVE-2006-4339
2178e4520c8bSEnji Cooper[CVE-2006-3737]: https://www.openssl.org/news/vulnerabilities.html#CVE-2006-3737
2179e4520c8bSEnji Cooper[CVE-2006-2940]: https://www.openssl.org/news/vulnerabilities.html#CVE-2006-2940
2180e4520c8bSEnji Cooper[CVE-2006-2937]: https://www.openssl.org/news/vulnerabilities.html#CVE-2006-2937
2181e4520c8bSEnji Cooper[CVE-2005-2969]: https://www.openssl.org/news/vulnerabilities.html#CVE-2005-2969
218229536654SEnji Cooper[OpenSSL Guide]: https://www.openssl.org/docs/manmaster/man7/ossl-guide-introduction.html
218329536654SEnji Cooper[CHANGES.md]: ./CHANGES.md
218429536654SEnji Cooper[README-QUIC.md]: ./README-QUIC.md
218529536654SEnji Cooper[issue tracker]: https://github.com/openssl/openssl/issues
218629536654SEnji Cooper[CMVP]: https://csrc.nist.gov/projects/cryptographic-module-validation-program
218729536654SEnji Cooper[ESV]: https://csrc.nist.gov/Projects/cryptographic-module-validation-program/entropy-validations
218829536654SEnji Cooper[jitterentropy-library]: https://github.com/smuellerDD/jitterentropy-library
2189