1e4520c8bSEnji CooperNEWS 2e4520c8bSEnji Cooper==== 3e4520c8bSEnji Cooper 4e4520c8bSEnji CooperThis file gives a brief overview of the major changes between each OpenSSL 5e4520c8bSEnji Cooperrelease. For more details please read the CHANGES file. 6e4520c8bSEnji Cooper 7e4520c8bSEnji CooperOpenSSL Releases 8e4520c8bSEnji Cooper---------------- 9e4520c8bSEnji Cooper 1029536654SEnji Cooper - [OpenSSL 3.5](#openssl-35) 1129536654SEnji Cooper - [OpenSSL 3.4](#openssl-34) 1229536654SEnji Cooper - [OpenSSL 3.3](#openssl-33) 1329536654SEnji Cooper - [OpenSSL 3.2](#openssl-32) 1429536654SEnji Cooper - [OpenSSL 3.1](#openssl-31) 15e4520c8bSEnji Cooper - [OpenSSL 3.0](#openssl-30) 16e4520c8bSEnji Cooper - [OpenSSL 1.1.1](#openssl-111) 17e4520c8bSEnji Cooper - [OpenSSL 1.1.0](#openssl-110) 18e4520c8bSEnji Cooper - [OpenSSL 1.0.2](#openssl-102) 19e4520c8bSEnji Cooper - [OpenSSL 1.0.1](#openssl-101) 20e4520c8bSEnji Cooper - [OpenSSL 1.0.0](#openssl-100) 21e4520c8bSEnji Cooper - [OpenSSL 0.9.x](#openssl-09x) 22e4520c8bSEnji Cooper 2329536654SEnji CooperOpenSSL 3.5 24e4520c8bSEnji Cooper----------- 25e4520c8bSEnji Cooper 26808413daSEnji Cooper### Major changes between OpenSSL 3.5.4 and OpenSSL 3.5.5 [27 Jan 2026] 27808413daSEnji Cooper 28808413daSEnji CooperOpenSSL 3.5.5 is a security patch release. The most severe CVE fixed in this 29808413daSEnji Cooperrelease is High. 30808413daSEnji Cooper 31808413daSEnji CooperThis release incorporates the following bug fixes and mitigations: 32808413daSEnji Cooper 33808413daSEnji Cooper * Fixed Improper validation of PBMAC1 parameters in PKCS#12 MAC verification. 34808413daSEnji Cooper ([CVE-2025-11187]) 35808413daSEnji Cooper 36808413daSEnji Cooper * Fixed Stack buffer overflow in CMS `AuthEnvelopedData` parsing. 37808413daSEnji Cooper ([CVE-2025-15467]) 38808413daSEnji Cooper 39808413daSEnji Cooper * Fixed NULL dereference in `SSL_CIPHER_find()` function on unknown cipher ID. 40808413daSEnji Cooper ([CVE-2025-15468]) 41808413daSEnji Cooper 42808413daSEnji Cooper * Fixed `openssl dgst` one-shot codepath silently truncates inputs >16 MiB. 43808413daSEnji Cooper ([CVE-2025-15469]) 44808413daSEnji Cooper 45808413daSEnji Cooper * Fixed TLS 1.3 `CompressedCertificate` excessive memory allocation. 46808413daSEnji Cooper ([CVE-2025-66199]) 47808413daSEnji Cooper 48808413daSEnji Cooper * Fixed Heap out-of-bounds write in `BIO_f_linebuffer` on short writes. 49808413daSEnji Cooper ([CVE-2025-68160]) 50808413daSEnji Cooper 51808413daSEnji Cooper * Fixed Unauthenticated/unencrypted trailing bytes with low-level OCB 52808413daSEnji Cooper function calls. 53808413daSEnji Cooper ([CVE-2025-69418]) 54808413daSEnji Cooper 55808413daSEnji Cooper * Fixed Out of bounds write in `PKCS12_get_friendlyname()` UTF-8 conversion. 56808413daSEnji Cooper ([CVE-2025-69419]) 57808413daSEnji Cooper 58808413daSEnji Cooper * Fixed Missing `ASN1_TYPE` validation in `TS_RESP_verify_response()` 59808413daSEnji Cooper function. 60808413daSEnji Cooper ([CVE-2025-69420]) 61808413daSEnji Cooper 62808413daSEnji Cooper * Fixed NULL Pointer Dereference in `PKCS12_item_decrypt_d2i_ex()` function. 63808413daSEnji Cooper ([CVE-2025-69421]) 64808413daSEnji Cooper 65808413daSEnji Cooper * Fixed Missing `ASN1_TYPE` validation in PKCS#12 parsing. 66808413daSEnji Cooper ([CVE-2026-22795]) 67808413daSEnji Cooper 68808413daSEnji Cooper * Fixed `ASN1_TYPE` Type Confusion in the `PKCS7_digest_from_attributes()` 69808413daSEnji Cooper function. 70808413daSEnji Cooper ([CVE-2026-22796]) 71808413daSEnji Cooper 728e12a5c4SEnji Cooper### Major changes between OpenSSL 3.5.3 and OpenSSL 3.5.4 [30 Sep 2025] 738e12a5c4SEnji Cooper 748e12a5c4SEnji CooperOpenSSL 3.5.4 is a security patch release. The most severe CVE fixed in this 758e12a5c4SEnji Cooperrelease is Moderate. 768e12a5c4SEnji Cooper 778e12a5c4SEnji CooperThis release incorporates the following bug fixes and mitigations: 788e12a5c4SEnji Cooper 798e12a5c4SEnji Cooper * Fix Out-of-bounds read & write in RFC 3211 KEK Unwrap. 808e12a5c4SEnji Cooper ([CVE-2025-9230]) 818e12a5c4SEnji Cooper 828e12a5c4SEnji Cooper * Fix Timing side-channel in SM2 algorithm on 64 bit ARM. 838e12a5c4SEnji Cooper ([CVE-2025-9231]) 848e12a5c4SEnji Cooper 858e12a5c4SEnji Cooper * Fix Out-of-bounds read in HTTP client no_proxy handling. 868e12a5c4SEnji Cooper ([CVE-2025-9232]) 878e12a5c4SEnji Cooper 888e12a5c4SEnji Cooper * Reverted the synthesised `OPENSSL_VERSION_NUMBER` change for the release 898e12a5c4SEnji Cooper builds, as it broke some exiting applications that relied on the previous 908e12a5c4SEnji Cooper 3.x semantics, as documented in `OpenSSL_version(3)`. 918e12a5c4SEnji Cooper 92aed904c4SEnji Cooper### Major changes between OpenSSL 3.5.2 and OpenSSL 3.5.3 [16 Sep 2025] 93aed904c4SEnji Cooper 948e12a5c4SEnji CooperOpenSSL 3.5.3 is a bug fix release. 958e12a5c4SEnji Cooper 968e12a5c4SEnji CooperThis release incorporates the following bug fixes and mitigations: 978e12a5c4SEnji Cooper 98aed904c4SEnji Cooper * Added FIPS 140-3 PCT on DH key generation. 99aed904c4SEnji Cooper 100aed904c4SEnji Cooper * Fixed the synthesised `OPENSSL_VERSION_NUMBER`. 101aed904c4SEnji Cooper 1028e12a5c4SEnji Cooper * Removed PCT on key import in the FIPS provider as it is not required by 1038e12a5c4SEnji Cooper the standard. 104aed904c4SEnji Cooper 105fbc35f82SEnji Cooper### Major changes between OpenSSL 3.5.1 and OpenSSL 3.5.2 [5 Aug 2025] 106fbc35f82SEnji Cooper 1078e12a5c4SEnji CooperOpenSSL 3.5.2 is a bug fix release. 1088e12a5c4SEnji Cooper 1098e12a5c4SEnji CooperThis release incorporates the following bug fixes and mitigations: 1108e12a5c4SEnji Cooper 1118e12a5c4SEnji Cooper * The FIPS provider now performs a PCT on key import for RSA, EC and ECX. 112fbc35f82SEnji Cooper 1131095efe4SPierre Pronchery### Major changes between OpenSSL 3.5.0 and OpenSSL 3.5.1 [1 Jul 2025] 1141095efe4SPierre Pronchery 1151095efe4SPierre ProncheryOpenSSL 3.5.1 is a security patch release. The most severe CVE fixed in this 1161095efe4SPierre Proncheryrelease is Low. 1171095efe4SPierre Pronchery 1181095efe4SPierre ProncheryThis release incorporates the following bug fixes and mitigations: 1191095efe4SPierre Pronchery 1201095efe4SPierre Pronchery * Fix x509 application adds trusted use instead of rejected use. 1211095efe4SPierre Pronchery ([CVE-2025-4575]) 1221095efe4SPierre Pronchery 12329536654SEnji Cooper### Major changes between OpenSSL 3.4 and OpenSSL 3.5.0 [8 Apr 2025] 1241c342803SEnji Cooper 12529536654SEnji CooperOpenSSL 3.5.0 is a feature release adding significant new functionality to 12629536654SEnji CooperOpenSSL. 12729536654SEnji Cooper 12829536654SEnji CooperThis release incorporates the following potentially significant or incompatible 12929536654SEnji Cooperchanges: 13029536654SEnji Cooper 13129536654SEnji Cooper * Default encryption cipher for the `req`, `cms`, and `smime` applications 13229536654SEnji Cooper changed from `des-ede3-cbc` to `aes-256-cbc`. 13329536654SEnji Cooper 13429536654SEnji Cooper * The default TLS supported groups list has been changed to include and 13529536654SEnji Cooper prefer hybrid PQC KEM groups. Some practically unused groups were removed 13629536654SEnji Cooper from the default list. 13729536654SEnji Cooper 13829536654SEnji Cooper * The default TLS keyshares have been changed to offer X25519MLKEM768 and 13929536654SEnji Cooper and X25519. 14029536654SEnji Cooper 14129536654SEnji Cooper * All `BIO_meth_get_*()` functions were deprecated. 14229536654SEnji Cooper 14329536654SEnji CooperThis release adds the following new features: 14429536654SEnji Cooper 14529536654SEnji Cooper * Support for server side QUIC (RFC 9000) 14629536654SEnji Cooper 14729536654SEnji Cooper * Support for 3rd party QUIC stacks including 0-RTT support 14829536654SEnji Cooper 14929536654SEnji Cooper * Support for PQC algorithms (ML-KEM, ML-DSA and SLH-DSA) 15029536654SEnji Cooper 15129536654SEnji Cooper * A new configuration option `no-tls-deprecated-ec` to disable support for 15229536654SEnji Cooper TLS groups deprecated in RFC8422 15329536654SEnji Cooper 15429536654SEnji Cooper * A new configuration option `enable-fips-jitter` to make the FIPS provider 15529536654SEnji Cooper to use the `JITTER` seed source 15629536654SEnji Cooper 15729536654SEnji Cooper * Support for central key generation in CMP 15829536654SEnji Cooper 15929536654SEnji Cooper * Support added for opaque symmetric key objects (EVP_SKEY) 16029536654SEnji Cooper 16129536654SEnji Cooper * Support for multiple TLS keyshares and improved TLS key establishment group 16229536654SEnji Cooper configurability 16329536654SEnji Cooper 16429536654SEnji Cooper * API support for pipelining in provided cipher algorithms 16529536654SEnji Cooper 16629536654SEnji CooperKnown issues in 3.5.0 16729536654SEnji Cooper 16829536654SEnji Cooper * <https://github.com/openssl/openssl/issues/27282> 16929536654SEnji Cooper Calling SSL_accept on objects returned from SSL_accept_connection 17029536654SEnji Cooper results in error. It is expected that making this call will advance 17129536654SEnji Cooper the SSL handshake for the passed connection, but currently it does not. 17229536654SEnji Cooper This can be handled by calling SSL_do_handshake instead. A fix is planned 17329536654SEnji Cooper for OpenSSL 3.5.1 17429536654SEnji Cooper 17529536654SEnji CooperOpenSSL 3.4 17629536654SEnji Cooper----------- 17729536654SEnji Cooper 17829536654SEnji Cooper### Major changes between OpenSSL 3.4.0 and OpenSSL 3.4.1 [11 Feb 2025] 17929536654SEnji Cooper 18029536654SEnji CooperOpenSSL 3.4.1 is a security patch release. The most severe CVE fixed in this 18129536654SEnji Cooperrelease is High. 1821c342803SEnji Cooper 1831c342803SEnji CooperThis release incorporates the following bug fixes and mitigations: 1841c342803SEnji Cooper 18529536654SEnji Cooper * Fixed RFC7250 handshakes with unauthenticated servers don't abort as expected. 18629536654SEnji Cooper ([CVE-2024-12797]) 18729536654SEnji Cooper 1881c342803SEnji Cooper * Fixed timing side-channel in ECDSA signature computation. 1891c342803SEnji Cooper ([CVE-2024-13176]) 1901c342803SEnji Cooper 19129536654SEnji Cooper### Major changes between OpenSSL 3.3 and OpenSSL 3.4.0 [22 Oct 2024] 19229536654SEnji Cooper 19329536654SEnji CooperOpenSSL 3.4.0 is a feature release adding significant new functionality to 19429536654SEnji CooperOpenSSL. 19529536654SEnji Cooper 19629536654SEnji CooperThis release incorporates the following potentially significant or incompatible 19729536654SEnji Cooperchanges: 19829536654SEnji Cooper 19929536654SEnji Cooper * Deprecation of TS_VERIFY_CTX_set_* functions and addition of replacement 20029536654SEnji Cooper TS_VERIFY_CTX_set0_* functions with improved semantics 20129536654SEnji Cooper 20229536654SEnji Cooper * Redesigned use of OPENSSLDIR/ENGINESDIR/MODULESDIR on Windows such that 20329536654SEnji Cooper what were formerly build time locations can now be defined at run time 20429536654SEnji Cooper with registry keys 20529536654SEnji Cooper 20629536654SEnji Cooper * The X25519 and X448 key exchange implementation in the FIPS provider 20729536654SEnji Cooper is unapproved and has `fips=no` property. 20829536654SEnji Cooper 20929536654SEnji Cooper * SHAKE-128 and SHAKE-256 implementations have no default digest length 21029536654SEnji Cooper anymore. That means these algorithms cannot be used with 21129536654SEnji Cooper EVP_DigestFinal/_ex() unless the `xoflen` param is set before. 21229536654SEnji Cooper 21329536654SEnji Cooper * Setting `config_diagnostics=1` in the config file will cause errors to 21429536654SEnji Cooper be returned from SSL_CTX_new() and SSL_CTX_new_ex() if there is an error 21529536654SEnji Cooper in the ssl module configuration. 21629536654SEnji Cooper 21729536654SEnji Cooper * An empty renegotiate extension will be used in TLS client hellos instead 21829536654SEnji Cooper of the empty renegotiation SCSV, for all connections with a minimum TLS 21929536654SEnji Cooper version > 1.0. 22029536654SEnji Cooper 22129536654SEnji Cooper * Deprecation of SSL_SESSION_get_time(), SSL_SESSION_set_time() and 22229536654SEnji Cooper SSL_CTX_flush_sessions() functions in favor of their respective `_ex` 22329536654SEnji Cooper functions which are Y2038-safe on platforms with Y2038-safe `time_t` 22429536654SEnji Cooper 22529536654SEnji CooperThis release adds the following new features: 22629536654SEnji Cooper 22729536654SEnji Cooper * Support for directly fetched composite signature algorithms such as 22829536654SEnji Cooper RSA-SHA2-256 including new API functions 22929536654SEnji Cooper 23029536654SEnji Cooper * FIPS indicators support in the FIPS provider and various updates of the FIPS 23129536654SEnji Cooper provider required for future FIPS 140-3 validations 23229536654SEnji Cooper 23329536654SEnji Cooper * Implementation of RFC 9579 (PBMAC1) in PKCS#12 23429536654SEnji Cooper 23529536654SEnji Cooper * An optional additional random seed source RNG `JITTER` using a statically 23629536654SEnji Cooper linked jitterentropy library 23729536654SEnji Cooper 23829536654SEnji Cooper * New options `-not_before` and `-not_after` for explicit setting start and 23929536654SEnji Cooper end dates of certificates created with the `req` and `x509` apps 24029536654SEnji Cooper 24129536654SEnji Cooper * Support for integrity-only cipher suites TLS_SHA256_SHA256 and 24229536654SEnji Cooper TLS_SHA384_SHA384 in TLS 1.3, as defined in RFC 9150 24329536654SEnji Cooper 24429536654SEnji Cooper * Support for retrieving certificate request templates and CRLs in CMP 24529536654SEnji Cooper 24629536654SEnji Cooper * Support for additional X.509v3 extensions related to Attribute Certificates 24729536654SEnji Cooper 24829536654SEnji Cooper * Initial Attribute Certificate (RFC 5755) support 24929536654SEnji Cooper 25029536654SEnji Cooper * Possibility to customize ECC groups initialization to use precomputed values 25129536654SEnji Cooper to save CPU time and use of this feature by the P-256 implementation 25229536654SEnji Cooper 25329536654SEnji CooperOpenSSL 3.3 25429536654SEnji Cooper----------- 25529536654SEnji Cooper 25629536654SEnji Cooper### Major changes between OpenSSL 3.3.2 and OpenSSL 3.3.3 [under development] 25729536654SEnji Cooper 25829536654SEnji CooperOpenSSL 3.3.3 is a security patch release. The most severe CVE fixed in this 25929536654SEnji Cooperrelease is Low. 26029536654SEnji Cooper 26129536654SEnji CooperThis release incorporates the following bug fixes and mitigations: 26229536654SEnji Cooper 2631c342803SEnji Cooper * Fixed possible OOB memory access with invalid low-level GF(2^m) elliptic 2641c342803SEnji Cooper curve parameters. 2651c342803SEnji Cooper ([CVE-2024-9143]) 2661c342803SEnji Cooper 26729536654SEnji Cooper### Major changes between OpenSSL 3.3.1 and OpenSSL 3.3.2 [3 Sep 2024] 268108164cfSGordon Tetlow 26929536654SEnji CooperOpenSSL 3.3.2 is a security patch release. The most severe CVE fixed in this 270108164cfSGordon Tetlowrelease is Moderate. 271108164cfSGordon Tetlow 272108164cfSGordon TetlowThis release incorporates the following bug fixes and mitigations: 273108164cfSGordon Tetlow 274108164cfSGordon Tetlow * Fixed possible denial of service in X.509 name checks 275108164cfSGordon Tetlow ([CVE-2024-6119]) 276108164cfSGordon Tetlow 277108164cfSGordon Tetlow * Fixed possible buffer overread in SSL_select_next_proto() 278108164cfSGordon Tetlow ([CVE-2024-5535]) 279108164cfSGordon Tetlow 28029536654SEnji Cooper### Major changes between OpenSSL 3.3.0 and OpenSSL 3.3.1 [4 Jun 2024] 28129536654SEnji Cooper 28229536654SEnji CooperOpenSSL 3.3.1 is a security patch release. The most severe CVE fixed in this 28329536654SEnji Cooperrelease is Low. 28429536654SEnji Cooper 28529536654SEnji CooperThis release incorporates the following bug fixes and mitigations: 2861070e7dcSEnji Cooper 2871070e7dcSEnji Cooper * Fixed potential use after free after SSL_free_buffers() is called 2881070e7dcSEnji Cooper ([CVE-2024-4741]) 2891070e7dcSEnji Cooper 2901070e7dcSEnji Cooper * Fixed an issue where checking excessively long DSA keys or parameters may 2911070e7dcSEnji Cooper be very slow 2921070e7dcSEnji Cooper ([CVE-2024-4603]) 2931070e7dcSEnji Cooper 29429536654SEnji Cooper### Major changes between OpenSSL 3.2 and OpenSSL 3.3.0 [9 Apr 2024] 29529536654SEnji Cooper 29629536654SEnji CooperOpenSSL 3.3.0 is a feature release adding significant new functionality to 29729536654SEnji CooperOpenSSL. 29829536654SEnji Cooper 29929536654SEnji CooperThis release adds the following new features: 30029536654SEnji Cooper 30129536654SEnji Cooper * Support for qlog for tracing QUIC connections has been added 30229536654SEnji Cooper 30329536654SEnji Cooper * Added APIs to allow configuring the negotiated idle timeout for QUIC 30429536654SEnji Cooper connections, and to allow determining the number of additional streams 30529536654SEnji Cooper that can currently be created for a QUIC connection. 30629536654SEnji Cooper 30729536654SEnji Cooper * Added APIs to allow disabling implicit QUIC event processing for QUIC SSL 30829536654SEnji Cooper objects 30929536654SEnji Cooper 31029536654SEnji Cooper * Added APIs to allow querying the size and utilisation of a QUIC stream's 31129536654SEnji Cooper write buffer 31229536654SEnji Cooper 31329536654SEnji Cooper * New API `SSL_write_ex2`, which can be used to send an end-of-stream (FIN) 31429536654SEnji Cooper condition in an optimised way when using QUIC. 31529536654SEnji Cooper 31629536654SEnji Cooper * Limited support for polling of QUIC connection and stream objects in a 31729536654SEnji Cooper non-blocking manner. 31829536654SEnji Cooper 31929536654SEnji Cooper * Added a new EVP_DigestSqueeze() API. This allows SHAKE to squeeze multiple 32029536654SEnji Cooper times with different output sizes. 32129536654SEnji Cooper 32229536654SEnji Cooper * Added exporter for CMake on Unix and Windows, alongside the pkg-config 32329536654SEnji Cooper exporter. 32429536654SEnji Cooper 32529536654SEnji Cooper * The BLAKE2s hash algorithm matches BLAKE2b's support for configurable 32629536654SEnji Cooper output length. 32729536654SEnji Cooper 32829536654SEnji Cooper * The EVP_PKEY_fromdata function has been augmented to allow for the 32929536654SEnji Cooper derivation of CRT (Chinese Remainder Theorem) parameters when requested 33029536654SEnji Cooper 33129536654SEnji Cooper * Added API functions SSL_SESSION_get_time_ex(), SSL_SESSION_set_time_ex() 33229536654SEnji Cooper using time_t which is Y2038 safe on 32 bit systems when 64 bit time 33329536654SEnji Cooper is enabled 33429536654SEnji Cooper 33529536654SEnji Cooper * Unknown entries in TLS SignatureAlgorithms, ClientSignatureAlgorithms 33629536654SEnji Cooper config options and the respective calls to SSL[_CTX]_set1_sigalgs() and 33729536654SEnji Cooper SSL[_CTX]_set1_client_sigalgs() that start with `?` character are 33829536654SEnji Cooper ignored and the configuration will still be used. 33929536654SEnji Cooper 34029536654SEnji Cooper * Added `-set_issuer` and `-set_subject` options to `openssl x509` to 34129536654SEnji Cooper override the Issuer and Subject when creating a certificate. The `-subj` 34229536654SEnji Cooper option now is an alias for `-set_subject`. 34329536654SEnji Cooper 34429536654SEnji Cooper * Added several new features of CMPv3 defined in RFC 9480 and RFC 9483 34529536654SEnji Cooper 34629536654SEnji Cooper * New option `SSL_OP_PREFER_NO_DHE_KEX`, which allows configuring a TLS1.3 34729536654SEnji Cooper server to prefer session resumption using PSK-only key exchange over PSK 34829536654SEnji Cooper with DHE, if both are available. 34929536654SEnji Cooper 35029536654SEnji Cooper * New atexit configuration switch, which controls whether the OPENSSL_cleanup 35129536654SEnji Cooper is registered when libcrypto is unloaded. 35229536654SEnji Cooper 35329536654SEnji Cooper * Added X509_STORE_get1_objects to avoid issues with the existing 35429536654SEnji Cooper X509_STORE_get0_objects API in multi-threaded applications. 35529536654SEnji Cooper 356808413daSEnji Cooper * Support for using certificate profiles and extended delayed delivery in CMP 35729536654SEnji Cooper 35829536654SEnji CooperThis release incorporates the following potentially significant or incompatible 35929536654SEnji Cooperchanges: 36029536654SEnji Cooper 36129536654SEnji Cooper * Applied AES-GCM unroll8 optimisation to Microsoft Azure Cobalt 100 36229536654SEnji Cooper 36329536654SEnji Cooper * Optimized AES-CTR for ARM Neoverse V1 and V2 36429536654SEnji Cooper 36529536654SEnji Cooper * Enable AES and SHA3 optimisations on Apple Silicon M3-based MacOS systems 36629536654SEnji Cooper similar to M1/M2. 36729536654SEnji Cooper 36829536654SEnji Cooper * Various optimizations for cryptographic routines using RISC-V vector crypto 36929536654SEnji Cooper extensions 37029536654SEnji Cooper 37129536654SEnji Cooper * Added assembly implementation for md5 on loongarch64 37229536654SEnji Cooper 37329536654SEnji Cooper * Accept longer context for TLS 1.2 exporters 37429536654SEnji Cooper 37529536654SEnji Cooper * The activate and soft_load configuration settings for providers in 37629536654SEnji Cooper openssl.cnf have been updated to require a value of [1|yes|true|on] 37729536654SEnji Cooper (in lower or UPPER case) to enable the setting. Conversely a value 37829536654SEnji Cooper of [0|no|false|off] will disable the setting. 37929536654SEnji Cooper 38029536654SEnji Cooper * In `openssl speed`, changed the default hash function used with `hmac` from 38129536654SEnji Cooper `md5` to `sha256`. 38229536654SEnji Cooper 38329536654SEnji Cooper * The `-verify` option to the `openssl crl` and `openssl req` will make the 38429536654SEnji Cooper program exit with 1 on failure. 38529536654SEnji Cooper 38629536654SEnji Cooper * The d2i_ASN1_GENERALIZEDTIME(), d2i_ASN1_UTCTIME(), ASN1_TIME_check(), and 38729536654SEnji Cooper related functions have been augmented to check for a minimum length of 38829536654SEnji Cooper the input string, in accordance with ITU-T X.690 section 11.7 and 11.8. 38929536654SEnji Cooper 39029536654SEnji Cooper * OPENSSL_sk_push() and sk_<TYPE>_push() functions now return 0 instead of -1 39129536654SEnji Cooper if called with a NULL stack argument. 39229536654SEnji Cooper 39329536654SEnji Cooper * New limit on HTTP response headers is introduced to HTTP client. The 39429536654SEnji Cooper default limit is set to 256 header lines. 39529536654SEnji Cooper 39629536654SEnji CooperThis release incorporates the following bug fixes and mitigations: 39729536654SEnji Cooper 39829536654SEnji Cooper * The BIO_get_new_index() function can only be called 127 times before it 39929536654SEnji Cooper reaches its upper bound of BIO_TYPE_MASK and will now return -1 once its 40029536654SEnji Cooper exhausted. 40129536654SEnji Cooper 40229536654SEnji CooperA more detailed list of changes in this release can be found in the 40329536654SEnji Cooper[CHANGES.md] file. 40429536654SEnji Cooper 40529536654SEnji CooperUsers interested in using the new QUIC functionality are encouraged to read the 40629536654SEnji Cooper[README file for QUIC][README-QUIC.md], which provides links to relevant 40729536654SEnji Cooperdocumentation and example code. 40829536654SEnji Cooper 40929536654SEnji CooperAs always, bug reports and issues relating to OpenSSL can be [filed on our issue 41029536654SEnji Coopertracker][issue tracker]. 41129536654SEnji Cooper 41229536654SEnji CooperOpenSSL 3.2 41329536654SEnji Cooper----------- 41429536654SEnji Cooper 41529536654SEnji Cooper### Major changes between OpenSSL 3.2.1 and OpenSSL 3.2.2 [under development] 41629536654SEnji Cooper 41729536654SEnji CooperOpenSSL 3.2.2 is a security patch release. The most severe CVE fixed in this 41829536654SEnji Cooperrelease is Low. 41929536654SEnji Cooper 42029536654SEnji CooperThis release incorporates the following bug fixes and mitigations: 42129536654SEnji Cooper 4221070e7dcSEnji Cooper * Fixed unbounded memory growth with session handling in TLSv1.3 4231070e7dcSEnji Cooper ([CVE-2024-2511]) 4241070e7dcSEnji Cooper 42529536654SEnji Cooper### Major changes between OpenSSL 3.2.0 and OpenSSL 3.2.1 [30 Jan 2024] 42629536654SEnji Cooper 42729536654SEnji CooperOpenSSL 3.2.1 is a security patch release. The most severe CVE fixed in this 42829536654SEnji Cooperrelease is Low. 42929536654SEnji Cooper 43029536654SEnji CooperThis release incorporates the following bug fixes and mitigations: 4319dd13e84SCy Schubert 4329dd13e84SCy Schubert * Fixed PKCS12 Decoding crashes 4339dd13e84SCy Schubert ([CVE-2024-0727]) 43429536654SEnji Cooper 43529536654SEnji Cooper * Fixed excessive time spent checking invalid RSA public keys 4369dd13e84SCy Schubert ([CVE-2023-6237]) 43729536654SEnji Cooper 4389dd13e84SCy Schubert * Fixed POLY1305 MAC implementation corrupting vector registers on PowerPC 4399dd13e84SCy Schubert CPUs which support PowerISA 2.07 4409dd13e84SCy Schubert ([CVE-2023-6129]) 4419dd13e84SCy Schubert 44229536654SEnji Cooper### Major changes between OpenSSL 3.1 and OpenSSL 3.2.0 [23 Nov 2023] 44329536654SEnji Cooper 44429536654SEnji CooperOpenSSL 3.2.0 is a feature release adding significant new functionality to 44529536654SEnji CooperOpenSSL. 44629536654SEnji Cooper 44729536654SEnji CooperThis release incorporates the following potentially significant or incompatible 44829536654SEnji Cooperchanges: 44929536654SEnji Cooper 45029536654SEnji Cooper * The default SSL/TLS security level has been changed from 1 to 2. 45129536654SEnji Cooper 45229536654SEnji Cooper * The `x509`, `ca`, and `req` apps now always produce X.509v3 certificates. 45329536654SEnji Cooper 45429536654SEnji Cooper * Subject or issuer names in X.509 objects are now displayed as UTF-8 strings 45529536654SEnji Cooper by default. Also spaces surrounding `=` in DN output are removed. 45629536654SEnji Cooper 45729536654SEnji CooperThis release adds the following new features: 45829536654SEnji Cooper 45929536654SEnji Cooper * Support for client side QUIC, including support for 46029536654SEnji Cooper multiple streams (RFC 9000) 46129536654SEnji Cooper 46229536654SEnji Cooper * Support for Ed25519ctx, Ed25519ph and Ed448ph in addition 46329536654SEnji Cooper to existing support for Ed25519 and Ed448 (RFC 8032) 46429536654SEnji Cooper 46529536654SEnji Cooper * Support for deterministic ECDSA signatures (RFC 6979) 46629536654SEnji Cooper 46729536654SEnji Cooper * Support for AES-GCM-SIV, a nonce-misuse-resistant AEAD (RFC 8452) 46829536654SEnji Cooper 46929536654SEnji Cooper * Support for the Argon2 KDF, along with supporting thread pool 47029536654SEnji Cooper functionality (RFC 9106) 47129536654SEnji Cooper 47229536654SEnji Cooper * Support for Hybrid Public Key Encryption (HPKE) (RFC 9180) 47329536654SEnji Cooper 47429536654SEnji Cooper * Support for SM4-XTS 47529536654SEnji Cooper 47629536654SEnji Cooper * Support for Brainpool curves in TLS 1.3 47729536654SEnji Cooper 47829536654SEnji Cooper * Support for TLS Raw Public Keys (RFC 7250) 47929536654SEnji Cooper 48029536654SEnji Cooper * Support for TCP Fast Open on Linux, macOS and FreeBSD, 48129536654SEnji Cooper where enabled and supported (RFC 7413) 48229536654SEnji Cooper 48329536654SEnji Cooper * Support for TLS certificate compression, including library 48429536654SEnji Cooper support for zlib, Brotli and zstd (RFC 8879) 48529536654SEnji Cooper 48629536654SEnji Cooper * Support for provider-based pluggable signature algorithms 48729536654SEnji Cooper in TLS 1.3 with supporting CMS and X.509 functionality 48829536654SEnji Cooper 48929536654SEnji Cooper With a suitable provider this enables the use of post-quantum/quantum-safe 49029536654SEnji Cooper cryptography. 49129536654SEnji Cooper 49229536654SEnji Cooper * Support for using the Windows system certificate store as a source of 49329536654SEnji Cooper trusted root certificates 49429536654SEnji Cooper 49529536654SEnji Cooper This is not yet enabled by default and must be activated using an 49629536654SEnji Cooper environment variable. This is likely to become enabled by default 49729536654SEnji Cooper in a future feature release. 49829536654SEnji Cooper 49929536654SEnji Cooper * Support for using the IANA standard names in TLS ciphersuite configuration 50029536654SEnji Cooper 50129536654SEnji Cooper * Multiple new features and improvements to CMP protocol support 50229536654SEnji Cooper 50329536654SEnji CooperThe following known issues are present in this release and will be rectified 50429536654SEnji Cooperin a future release: 50529536654SEnji Cooper 50629536654SEnji Cooper * Provider-based signature algorithms cannot be configured using the 50729536654SEnji Cooper SignatureAlgorithms configuration file parameter (#22761) 50829536654SEnji Cooper 50929536654SEnji CooperThis release incorporates the following documentation enhancements: 51029536654SEnji Cooper 51129536654SEnji Cooper * Added multiple tutorials on the OpenSSL library and in particular 51229536654SEnji Cooper on writing various clients (using TLS and QUIC protocols) with libssl 51329536654SEnji Cooper 51429536654SEnji Cooper See [OpenSSL Guide]. 51529536654SEnji Cooper 51629536654SEnji CooperThis release incorporates the following bug fixes and mitigations: 51729536654SEnji Cooper 51829536654SEnji Cooper * Fixed excessive time spent in DH check / generation with large Q parameter 51929536654SEnji Cooper value 52029536654SEnji Cooper ([CVE-2023-5678]) 52129536654SEnji Cooper 52229536654SEnji CooperA more detailed list of changes in this release can be found in the 52329536654SEnji Cooper[CHANGES.md] file. 52429536654SEnji Cooper 52529536654SEnji CooperUsers interested in using the new QUIC functionality are encouraged to read the 52629536654SEnji Cooper[README file for QUIC][README-QUIC.md], which provides links to relevant 52729536654SEnji Cooperdocumentation and example code. 52829536654SEnji Cooper 52929536654SEnji CooperAs always, bug reports and issues relating to OpenSSL can be [filed on our issue 53029536654SEnji Coopertracker][issue tracker]. 53129536654SEnji Cooper 53229536654SEnji CooperOpenSSL 3.1 53329536654SEnji Cooper----------- 53429536654SEnji Cooper 53529536654SEnji Cooper### Major changes between OpenSSL 3.1.3 and OpenSSL 3.1.4 [24 Oct 2023] 536825caf7eSEd Maste 537825caf7eSEd Maste * Mitigate incorrect resize handling for symmetric cipher keys and IVs. 538825caf7eSEd Maste ([CVE-2023-5363]) 539825caf7eSEd Maste 54029536654SEnji Cooper### Major changes between OpenSSL 3.1.2 and OpenSSL 3.1.3 [19 Sep 2023] 541315108b8SPierre Pronchery 542315108b8SPierre Pronchery * Fix POLY1305 MAC implementation corrupting XMM registers on Windows 543315108b8SPierre Pronchery ([CVE-2023-4807]) 544315108b8SPierre Pronchery 54529536654SEnji Cooper### Major changes between OpenSSL 3.1.1 and OpenSSL 3.1.2 [1 Aug 2023] 546cf2fc1b0SPierre Pronchery 547cf2fc1b0SPierre Pronchery * Fix excessive time spent checking DH q parameter value ([CVE-2023-3817]) 548cf2fc1b0SPierre Pronchery * Fix DH_check() excessive time with over sized modulus ([CVE-2023-3446]) 549cf2fc1b0SPierre Pronchery * Do not ignore empty associated data entries with AES-SIV ([CVE-2023-2975]) 55029536654SEnji Cooper * When building with the `enable-fips` option and using the resulting 55129536654SEnji Cooper FIPS provider, TLS 1.2 will, by default, mandate the use of an 55229536654SEnji Cooper extended master secret and the Hash and HMAC DRBGs will not operate 55329536654SEnji Cooper with truncated digests. 554cf2fc1b0SPierre Pronchery 55529536654SEnji Cooper### Major changes between OpenSSL 3.1.0 and OpenSSL 3.1.1 [30 May 2023] 556b84c4564SPierre Pronchery 557b84c4564SPierre Pronchery * Mitigate for very slow `OBJ_obj2txt()` performance with gigantic OBJECT 558b84c4564SPierre Pronchery IDENTIFIER sub-identities. ([CVE-2023-2650]) 559b84c4564SPierre Pronchery * Fixed buffer overread in AES-XTS decryption on ARM 64 bit platforms 560b84c4564SPierre Pronchery ([CVE-2023-1255]) 561b84c4564SPierre Pronchery * Fixed documentation of X509_VERIFY_PARAM_add0_policy() ([CVE-2023-0466]) 562b84c4564SPierre Pronchery * Fixed handling of invalid certificate policies in leaf certificates 563b84c4564SPierre Pronchery ([CVE-2023-0465]) 564b84c4564SPierre Pronchery * Limited the number of nodes created in a policy tree ([CVE-2023-0464]) 565b84c4564SPierre Pronchery 56629536654SEnji Cooper### Major changes between OpenSSL 3.0 and OpenSSL 3.1.0 [14 Mar 2023] 56729536654SEnji Cooper 56829536654SEnji Cooper * SSL 3, TLS 1.0, TLS 1.1, and DTLS 1.0 only work at security level 0. 56929536654SEnji Cooper * Performance enhancements and new platform support including new 57029536654SEnji Cooper assembler code algorithm implementations. 57129536654SEnji Cooper * Deprecated LHASH statistics functions. 57229536654SEnji Cooper * FIPS 140-3 compliance changes. 57329536654SEnji Cooper 57429536654SEnji CooperOpenSSL 3.0 57529536654SEnji Cooper----------- 57629536654SEnji Cooper 577e4520c8bSEnji Cooper### Major changes between OpenSSL 3.0.7 and OpenSSL 3.0.8 [7 Feb 2023] 578e4520c8bSEnji Cooper 579e4520c8bSEnji Cooper * Fixed NULL dereference during PKCS7 data verification ([CVE-2023-0401]) 580e4520c8bSEnji Cooper * Fixed X.400 address type confusion in X.509 GeneralName ([CVE-2023-0286]) 581e4520c8bSEnji Cooper * Fixed NULL dereference validating DSA public key ([CVE-2023-0217]) 582e4520c8bSEnji Cooper * Fixed Invalid pointer dereference in d2i_PKCS7 functions ([CVE-2023-0216]) 583e4520c8bSEnji Cooper * Fixed Use-after-free following BIO_new_NDEF ([CVE-2023-0215]) 584e4520c8bSEnji Cooper * Fixed Double free after calling PEM_read_bio_ex ([CVE-2022-4450]) 585e4520c8bSEnji Cooper * Fixed Timing Oracle in RSA Decryption ([CVE-2022-4304]) 586e4520c8bSEnji Cooper * Fixed X.509 Name Constraints Read Buffer Overflow ([CVE-2022-4203]) 587e4520c8bSEnji Cooper * Fixed X.509 Policy Constraints Double Locking ([CVE-2022-3996]) 588e4520c8bSEnji Cooper 589e4520c8bSEnji Cooper### Major changes between OpenSSL 3.0.6 and OpenSSL 3.0.7 [1 Nov 2022] 590e4520c8bSEnji Cooper 591e4520c8bSEnji Cooper * Added RIPEMD160 to the default provider. 592e4520c8bSEnji Cooper * Fixed regressions introduced in 3.0.6 version. 593e4520c8bSEnji Cooper * Fixed two buffer overflows in punycode decoding functions. 594e4520c8bSEnji Cooper ([CVE-2022-3786]) and ([CVE-2022-3602]) 595e4520c8bSEnji Cooper 596e4520c8bSEnji Cooper### Major changes between OpenSSL 3.0.5 and OpenSSL 3.0.6 [11 Oct 2022] 597e4520c8bSEnji Cooper 598e4520c8bSEnji Cooper * Fix for custom ciphers to prevent accidental use of NULL encryption 599e4520c8bSEnji Cooper ([CVE-2022-3358]) 600e4520c8bSEnji Cooper 601e4520c8bSEnji Cooper### Major changes between OpenSSL 3.0.4 and OpenSSL 3.0.5 [5 Jul 2022] 602e4520c8bSEnji Cooper 603e4520c8bSEnji Cooper * Fixed heap memory corruption with RSA private key operation 604e4520c8bSEnji Cooper ([CVE-2022-2274]) 605e4520c8bSEnji Cooper * Fixed AES OCB failure to encrypt some bytes on 32-bit x86 platforms 606e4520c8bSEnji Cooper ([CVE-2022-2097]) 607e4520c8bSEnji Cooper 608e4520c8bSEnji Cooper### Major changes between OpenSSL 3.0.3 and OpenSSL 3.0.4 [21 Jun 2022] 609e4520c8bSEnji Cooper 610e4520c8bSEnji Cooper * Fixed additional bugs in the c_rehash script which was not properly 611e4520c8bSEnji Cooper sanitising shell metacharacters to prevent command injection 612e4520c8bSEnji Cooper ([CVE-2022-2068]) 613e4520c8bSEnji Cooper 614e4520c8bSEnji Cooper### Major changes between OpenSSL 3.0.2 and OpenSSL 3.0.3 [3 May 2022] 615e4520c8bSEnji Cooper 616e4520c8bSEnji Cooper * Fixed a bug in the c_rehash script which was not properly sanitising shell 617e4520c8bSEnji Cooper metacharacters to prevent command injection ([CVE-2022-1292]) 618e4520c8bSEnji Cooper * Fixed a bug in the function `OCSP_basic_verify` that verifies the signer 619e4520c8bSEnji Cooper certificate on an OCSP response ([CVE-2022-1343]) 620e4520c8bSEnji Cooper * Fixed a bug where the RC4-MD5 ciphersuite incorrectly used the 621e4520c8bSEnji Cooper AAD data as the MAC key ([CVE-2022-1434]) 622e4520c8bSEnji Cooper * Fix a bug in the OPENSSL_LH_flush() function that breaks reuse of the memory 62329536654SEnji Cooper occupied by the removed hash table entries ([CVE-2022-1473]) 624e4520c8bSEnji Cooper 625e4520c8bSEnji Cooper### Major changes between OpenSSL 3.0.1 and OpenSSL 3.0.2 [15 Mar 2022] 626e4520c8bSEnji Cooper 627e4520c8bSEnji Cooper * Fixed a bug in the BN_mod_sqrt() function that can cause it to loop forever 628e4520c8bSEnji Cooper for non-prime moduli ([CVE-2022-0778]) 629e4520c8bSEnji Cooper 630e4520c8bSEnji Cooper### Major changes between OpenSSL 3.0.0 and OpenSSL 3.0.1 [14 Dec 2021] 631e4520c8bSEnji Cooper 632808413daSEnji Cooper * Fixed carry bug in BN_mod_exp which may produce incorrect results on MIPS 633808413daSEnji Cooper ([CVE-2021-4160]) 634e4520c8bSEnji Cooper * Fixed invalid handling of X509_verify_cert() internal errors in libssl 635e4520c8bSEnji Cooper ([CVE-2021-4044]) 636e4520c8bSEnji Cooper * Allow fetching an operation from the provider that owns an unexportable key 637e4520c8bSEnji Cooper as a fallback if that is still allowed by the property query. 638e4520c8bSEnji Cooper 639e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1 and OpenSSL 3.0.0 [7 sep 2021] 640e4520c8bSEnji Cooper 641e4520c8bSEnji Cooper * Enhanced 'openssl list' with many new options. 642e4520c8bSEnji Cooper * Added migration guide to man7. 643e4520c8bSEnji Cooper * Implemented support for fully "pluggable" TLSv1.3 groups. 64429536654SEnji Cooper * Added support for Kernel TLS (KTLS). 645e4520c8bSEnji Cooper * Changed the license to the Apache License v2.0. 646e4520c8bSEnji Cooper * Moved all variations of the EVP ciphers CAST5, BF, IDEA, SEED, RC2, 647e4520c8bSEnji Cooper RC4, RC5, and DES to the legacy provider. 648e4520c8bSEnji Cooper * Moved the EVP digests MD2, MD4, MDC2, WHIRLPOOL and RIPEMD-160 to the legacy 649e4520c8bSEnji Cooper provider. 650e4520c8bSEnji Cooper * Added convenience functions for generating asymmetric key pairs. 651e4520c8bSEnji Cooper * Deprecated the `OCSP_REQ_CTX` type and functions. 652e4520c8bSEnji Cooper * Deprecated the `EC_KEY` and `EC_KEY_METHOD` types and functions. 653e4520c8bSEnji Cooper * Deprecated the `RSA` and `RSA_METHOD` types and functions. 654e4520c8bSEnji Cooper * Deprecated the `DSA` and `DSA_METHOD` types and functions. 655e4520c8bSEnji Cooper * Deprecated the `DH` and `DH_METHOD` types and functions. 656e4520c8bSEnji Cooper * Deprecated the `ERR_load_` functions. 657e4520c8bSEnji Cooper * Remove the `RAND_DRBG` API. 658e4520c8bSEnji Cooper * Deprecated the `ENGINE` API. 659e4520c8bSEnji Cooper * Added `OSSL_LIB_CTX`, a libcrypto library context. 660e4520c8bSEnji Cooper * Added various `_ex` functions to the OpenSSL API that support using 661e4520c8bSEnji Cooper a non-default `OSSL_LIB_CTX`. 662e4520c8bSEnji Cooper * Interactive mode is removed from the 'openssl' program. 663e4520c8bSEnji Cooper * The X25519, X448, Ed25519, Ed448, SHAKE128 and SHAKE256 algorithms are 664e4520c8bSEnji Cooper included in the FIPS provider. 665e4520c8bSEnji Cooper * X509 certificates signed using SHA1 are no longer allowed at security 666e4520c8bSEnji Cooper level 1 or higher. The default security level for TLS is 1, so 667e4520c8bSEnji Cooper certificates signed using SHA1 are by default no longer trusted to 668e4520c8bSEnji Cooper authenticate servers or clients. 669e4520c8bSEnji Cooper * enable-crypto-mdebug and enable-crypto-mdebug-backtrace were mostly 670e4520c8bSEnji Cooper disabled; the project uses address sanitize/leak-detect instead. 671e4520c8bSEnji Cooper * Added a Certificate Management Protocol (CMP, RFC 4210) implementation 672e4520c8bSEnji Cooper also covering CRMF (RFC 4211) and HTTP transfer (RFC 6712). 673e4520c8bSEnji Cooper It is part of the crypto lib and adds a 'cmp' app with a demo configuration. 674e4520c8bSEnji Cooper All widely used CMP features are supported for both clients and servers. 675e4520c8bSEnji Cooper * Added a proper HTTP client supporting GET with optional redirection, POST, 676e4520c8bSEnji Cooper arbitrary request and response content types, TLS, persistent connections, 677e4520c8bSEnji Cooper connections via HTTP(s) proxies, connections and exchange via user-defined 678e4520c8bSEnji Cooper BIOs (allowing implicit connections), and timeout checks. 679e4520c8bSEnji Cooper * Added util/check-format.pl for checking adherence to the coding guidelines. 680e4520c8bSEnji Cooper * Added OSSL_ENCODER, a generic encoder API. 681e4520c8bSEnji Cooper * Added OSSL_DECODER, a generic decoder API. 682e4520c8bSEnji Cooper * Added OSSL_PARAM_BLD, an easier to use API to OSSL_PARAM. 683e4520c8bSEnji Cooper * Added error raising macros, ERR_raise() and ERR_raise_data(). 684e4520c8bSEnji Cooper * Deprecated ERR_put_error(), ERR_get_error_line(), ERR_get_error_line_data(), 685e4520c8bSEnji Cooper ERR_peek_error_line_data(), ERR_peek_last_error_line_data() and 686e4520c8bSEnji Cooper ERR_func_error_string(). 68729536654SEnji Cooper * Added OSSL_PROVIDER_available(), to check provider availability. 688e4520c8bSEnji Cooper * Added 'openssl mac' that uses the EVP_MAC API. 689e4520c8bSEnji Cooper * Added 'openssl kdf' that uses the EVP_KDF API. 690e4520c8bSEnji Cooper * Add OPENSSL_info() and 'openssl info' to get built-in data. 691e4520c8bSEnji Cooper * Add support for enabling instrumentation through trace and debug 692e4520c8bSEnji Cooper output. 693e4520c8bSEnji Cooper * Changed our version number scheme and set the next major release to 694e4520c8bSEnji Cooper 3.0.0 695e4520c8bSEnji Cooper * Added EVP_MAC, an EVP layer MAC API, and a generic EVP_PKEY to EVP_MAC 696e4520c8bSEnji Cooper bridge. Supported MACs are: BLAKE2, CMAC, GMAC, HMAC, KMAC, POLY1305 697e4520c8bSEnji Cooper and SIPHASH. 698e4520c8bSEnji Cooper * Removed the heartbeat message in DTLS feature. 699e4520c8bSEnji Cooper * Added EVP_KDF, an EVP layer KDF and PRF API, and a generic EVP_PKEY to 700e4520c8bSEnji Cooper EVP_KDF bridge. Supported KDFs are: HKDF, KBKDF, KRB5 KDF, PBKDF2, 701e4520c8bSEnji Cooper PKCS12 KDF, SCRYPT, SSH KDF, SSKDF, TLS1 PRF, X9.42 KDF and X9.63 KDF. 702e4520c8bSEnji Cooper * All of the low-level MD2, MD4, MD5, MDC2, RIPEMD160, SHA1, SHA224, 703e4520c8bSEnji Cooper SHA256, SHA384, SHA512 and Whirlpool digest functions have been 704e4520c8bSEnji Cooper deprecated. 705e4520c8bSEnji Cooper * All of the low-level AES, Blowfish, Camellia, CAST, DES, IDEA, RC2, 706e4520c8bSEnji Cooper RC4, RC5 and SEED cipher functions have been deprecated. 707e4520c8bSEnji Cooper * All of the low-level DH, DSA, ECDH, ECDSA and RSA public key functions 708e4520c8bSEnji Cooper have been deprecated. 709e4520c8bSEnji Cooper * SSL 3, TLS 1.0, TLS 1.1, and DTLS 1.0 only work at security level 0, 710e4520c8bSEnji Cooper except when RSA key exchange without SHA1 is used. 711e4520c8bSEnji Cooper * Added providers, a new pluggability concept that will replace the 712e4520c8bSEnji Cooper ENGINE API and ENGINE implementations. 713e4520c8bSEnji Cooper 714e4520c8bSEnji CooperOpenSSL 1.1.1 715e4520c8bSEnji Cooper------------- 716e4520c8bSEnji Cooper 717e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1k and OpenSSL 1.1.1l [24 Aug 2021] 718e4520c8bSEnji Cooper 719e4520c8bSEnji Cooper * Fixed an SM2 Decryption Buffer Overflow ([CVE-2021-3711]) 720e4520c8bSEnji Cooper * Fixed various read buffer overruns processing ASN.1 strings ([CVE-2021-3712]) 721e4520c8bSEnji Cooper 722e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1j and OpenSSL 1.1.1k [25 Mar 2021] 723e4520c8bSEnji Cooper 724e4520c8bSEnji Cooper * Fixed a problem with verifying a certificate chain when using the 725e4520c8bSEnji Cooper X509_V_FLAG_X509_STRICT flag ([CVE-2021-3450]) 726e4520c8bSEnji Cooper * Fixed an issue where an OpenSSL TLS server may crash if sent a maliciously 727e4520c8bSEnji Cooper crafted renegotiation ClientHello message from a client ([CVE-2021-3449]) 728e4520c8bSEnji Cooper 729e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1i and OpenSSL 1.1.1j [16 Feb 2021] 730e4520c8bSEnji Cooper 731e4520c8bSEnji Cooper * Fixed a NULL pointer deref in the X509_issuer_and_serial_hash() 732e4520c8bSEnji Cooper function ([CVE-2021-23841]) 733e4520c8bSEnji Cooper * Fixed the RSA_padding_check_SSLv23() function and the RSA_SSLV23_PADDING 734e4520c8bSEnji Cooper padding mode to correctly check for rollback attacks 735e4520c8bSEnji Cooper * Fixed an overflow in the EVP_CipherUpdate, EVP_EncryptUpdate and 736e4520c8bSEnji Cooper EVP_DecryptUpdate functions ([CVE-2021-23840]) 737e4520c8bSEnji Cooper * Fixed SRP_Calc_client_key so that it runs in constant time 738e4520c8bSEnji Cooper 739e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1h and OpenSSL 1.1.1i [8 Dec 2020] 740e4520c8bSEnji Cooper 741e4520c8bSEnji Cooper * Fixed NULL pointer deref in GENERAL_NAME_cmp ([CVE-2020-1971]) 742e4520c8bSEnji Cooper 743e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1g and OpenSSL 1.1.1h [22 Sep 2020] 744e4520c8bSEnji Cooper 745e4520c8bSEnji Cooper * Disallow explicit curve parameters in verifications chains when 746e4520c8bSEnji Cooper X509_V_FLAG_X509_STRICT is used 747e4520c8bSEnji Cooper * Enable 'MinProtocol' and 'MaxProtocol' to configure both TLS and DTLS 748e4520c8bSEnji Cooper contexts 749e4520c8bSEnji Cooper * Oracle Developer Studio will start reporting deprecation warnings 750e4520c8bSEnji Cooper 751e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1f and OpenSSL 1.1.1g [21 Apr 2020] 752e4520c8bSEnji Cooper 753e4520c8bSEnji Cooper * Fixed segmentation fault in SSL_check_chain() ([CVE-2020-1967]) 754e4520c8bSEnji Cooper 755e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1e and OpenSSL 1.1.1f [31 Mar 2020] 756e4520c8bSEnji Cooper 757e4520c8bSEnji Cooper * Revert the unexpected EOF reporting via SSL_ERROR_SSL 758e4520c8bSEnji Cooper 759e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1d and OpenSSL 1.1.1e [17 Mar 2020] 760e4520c8bSEnji Cooper 761e4520c8bSEnji Cooper * Fixed an overflow bug in the x64_64 Montgomery squaring procedure 762e4520c8bSEnji Cooper used in exponentiation with 512-bit moduli ([CVE-2019-1551]) 763e4520c8bSEnji Cooper 764e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1c and OpenSSL 1.1.1d [10 Sep 2019] 765e4520c8bSEnji Cooper 766e4520c8bSEnji Cooper * Fixed a fork protection issue ([CVE-2019-1549]) 767e4520c8bSEnji Cooper * Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey 768e4520c8bSEnji Cooper ([CVE-2019-1563]) 769e4520c8bSEnji Cooper * For built-in EC curves, ensure an EC_GROUP built from the curve name is 770e4520c8bSEnji Cooper used even when parsing explicit parameters 771e4520c8bSEnji Cooper * Compute ECC cofactors if not provided during EC_GROUP construction 772e4520c8bSEnji Cooper ([CVE-2019-1547]) 773e4520c8bSEnji Cooper * Early start up entropy quality from the DEVRANDOM seed source has been 774e4520c8bSEnji Cooper improved for older Linux systems 775e4520c8bSEnji Cooper * Correct the extended master secret constant on EBCDIC systems 776e4520c8bSEnji Cooper * Use Windows installation paths in the mingw builds ([CVE-2019-1552]) 777e4520c8bSEnji Cooper * Changed DH_check to accept parameters with order q and 2q subgroups 778e4520c8bSEnji Cooper * Significantly reduce secure memory usage by the randomness pools 779e4520c8bSEnji Cooper * Revert the DEVRANDOM_WAIT feature for Linux systems 780e4520c8bSEnji Cooper 781e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1b and OpenSSL 1.1.1c [28 May 2019] 782e4520c8bSEnji Cooper 783e4520c8bSEnji Cooper * Prevent over long nonces in ChaCha20-Poly1305 ([CVE-2019-1543]) 784e4520c8bSEnji Cooper 785e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1a and OpenSSL 1.1.1b [26 Feb 2019] 786e4520c8bSEnji Cooper 787e4520c8bSEnji Cooper * Change the info callback signals for the start and end of a post-handshake 788e4520c8bSEnji Cooper message exchange in TLSv1.3. 789e4520c8bSEnji Cooper * Fix a bug in DTLS over SCTP. This breaks interoperability with older 790e4520c8bSEnji Cooper versions of OpenSSL like OpenSSL 1.1.0 and OpenSSL 1.0.2. 791e4520c8bSEnji Cooper 792e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.1 and OpenSSL 1.1.1a [20 Nov 2018] 793e4520c8bSEnji Cooper 794e4520c8bSEnji Cooper * Timing vulnerability in DSA signature generation ([CVE-2018-0734]) 795e4520c8bSEnji Cooper * Timing vulnerability in ECDSA signature generation ([CVE-2018-0735]) 796e4520c8bSEnji Cooper 797e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0i and OpenSSL 1.1.1 [11 Sep 2018] 798e4520c8bSEnji Cooper 799e4520c8bSEnji Cooper * Support for TLSv1.3 added. The TLSv1.3 implementation includes: 800e4520c8bSEnji Cooper * Fully compliant implementation of RFC8446 (TLSv1.3) on by default 801e4520c8bSEnji Cooper * Early data (0-RTT) 802e4520c8bSEnji Cooper * Post-handshake authentication and key update 803e4520c8bSEnji Cooper * Middlebox Compatibility Mode 804e4520c8bSEnji Cooper * TLSv1.3 PSKs 805e4520c8bSEnji Cooper * Support for all five RFC8446 ciphersuites 806e4520c8bSEnji Cooper * RSA-PSS signature algorithms (backported to TLSv1.2) 807e4520c8bSEnji Cooper * Configurable session ticket support 808e4520c8bSEnji Cooper * Stateless server support 809e4520c8bSEnji Cooper * Rewrite of the packet construction code for "safer" packet handling 810e4520c8bSEnji Cooper * Rewrite of the extension handling code 811e4520c8bSEnji Cooper For further important information, see the [TLS1.3 page]( 81229536654SEnji Cooper https://github.com/openssl/openssl/wiki/TLS1.3) in the OpenSSL Wiki. 813e4520c8bSEnji Cooper 814e4520c8bSEnji Cooper * Complete rewrite of the OpenSSL random number generator to introduce the 815e4520c8bSEnji Cooper following capabilities 816e4520c8bSEnji Cooper * The default RAND method now utilizes an AES-CTR DRBG according to 817e4520c8bSEnji Cooper NIST standard SP 800-90Ar1. 818e4520c8bSEnji Cooper * Support for multiple DRBG instances with seed chaining. 819e4520c8bSEnji Cooper * There is a public and private DRBG instance. 820e4520c8bSEnji Cooper * The DRBG instances are fork-safe. 821e4520c8bSEnji Cooper * Keep all global DRBG instances on the secure heap if it is enabled. 822e4520c8bSEnji Cooper * The public and private DRBG instance are per thread for lock free 823e4520c8bSEnji Cooper operation 824e4520c8bSEnji Cooper * Support for various new cryptographic algorithms including: 825e4520c8bSEnji Cooper * SHA3 826e4520c8bSEnji Cooper * SHA512/224 and SHA512/256 827e4520c8bSEnji Cooper * EdDSA (both Ed25519 and Ed448) including X509 and TLS support 828e4520c8bSEnji Cooper * X448 (adding to the existing X25519 support in 1.1.0) 829e4520c8bSEnji Cooper * Multi-prime RSA 830e4520c8bSEnji Cooper * SM2 831e4520c8bSEnji Cooper * SM3 832e4520c8bSEnji Cooper * SM4 833e4520c8bSEnji Cooper * SipHash 834e4520c8bSEnji Cooper * ARIA (including TLS support) 835e4520c8bSEnji Cooper * Significant Side-Channel attack security improvements 836e4520c8bSEnji Cooper * Add a new ClientHello callback to provide the ability to adjust the SSL 837e4520c8bSEnji Cooper object at an early stage. 838e4520c8bSEnji Cooper * Add 'Maximum Fragment Length' TLS extension negotiation and support 839e4520c8bSEnji Cooper * A new STORE module, which implements a uniform and URI based reader of 840e4520c8bSEnji Cooper stores that can contain keys, certificates, CRLs and numerous other 841e4520c8bSEnji Cooper objects. 842e4520c8bSEnji Cooper * Move the display of configuration data to configdata.pm. 843e4520c8bSEnji Cooper * Allow GNU style "make variables" to be used with Configure. 844e4520c8bSEnji Cooper * Claim the namespaces OSSL and OPENSSL, represented as symbol prefixes 845e4520c8bSEnji Cooper * Rewrite of devcrypto engine 846e4520c8bSEnji Cooper 847e4520c8bSEnji CooperOpenSSL 1.1.0 848e4520c8bSEnji Cooper------------- 849e4520c8bSEnji Cooper 850e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0k and OpenSSL 1.1.0l [10 Sep 2019] 851e4520c8bSEnji Cooper 852e4520c8bSEnji Cooper * Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey 853e4520c8bSEnji Cooper ([CVE-2019-1563]) 854e4520c8bSEnji Cooper * For built-in EC curves, ensure an EC_GROUP built from the curve name is 855e4520c8bSEnji Cooper used even when parsing explicit parameters 856e4520c8bSEnji Cooper * Compute ECC cofactors if not provided during EC_GROUP construction 857e4520c8bSEnji Cooper ([CVE-2019-1547]) 858e4520c8bSEnji Cooper * Use Windows installation paths in the mingw builds ([CVE-2019-1552]) 859e4520c8bSEnji Cooper 860e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0j and OpenSSL 1.1.0k [28 May 2019] 861e4520c8bSEnji Cooper 862e4520c8bSEnji Cooper * Prevent over long nonces in ChaCha20-Poly1305 ([CVE-2019-1543]) 863e4520c8bSEnji Cooper 864e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0i and OpenSSL 1.1.0j [20 Nov 2018] 865e4520c8bSEnji Cooper 866e4520c8bSEnji Cooper * Timing vulnerability in DSA signature generation ([CVE-2018-0734]) 867e4520c8bSEnji Cooper * Timing vulnerability in ECDSA signature generation ([CVE-2018-0735]) 868e4520c8bSEnji Cooper 869e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0h and OpenSSL 1.1.0i [14 Aug 2018] 870e4520c8bSEnji Cooper 871e4520c8bSEnji Cooper * Client DoS due to large DH parameter ([CVE-2018-0732]) 872e4520c8bSEnji Cooper * Cache timing vulnerability in RSA Key Generation ([CVE-2018-0737]) 873e4520c8bSEnji Cooper 874e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0g and OpenSSL 1.1.0h [27 Mar 2018] 875e4520c8bSEnji Cooper 876e4520c8bSEnji Cooper * Constructed ASN.1 types with a recursive definition could exceed the 877e4520c8bSEnji Cooper stack ([CVE-2018-0739]) 878e4520c8bSEnji Cooper * Incorrect CRYPTO_memcmp on HP-UX PA-RISC ([CVE-2018-0733]) 879e4520c8bSEnji Cooper * rsaz_1024_mul_avx2 overflow bug on x86_64 ([CVE-2017-3738]) 880e4520c8bSEnji Cooper 881e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0f and OpenSSL 1.1.0g [2 Nov 2017] 882e4520c8bSEnji Cooper 883e4520c8bSEnji Cooper * bn_sqrx8x_internal carry bug on x86_64 ([CVE-2017-3736]) 884e4520c8bSEnji Cooper * Malformed X.509 IPAddressFamily could cause OOB read ([CVE-2017-3735]) 885e4520c8bSEnji Cooper 886e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0e and OpenSSL 1.1.0f [25 May 2017] 887e4520c8bSEnji Cooper 888e4520c8bSEnji Cooper * config now recognises 64-bit mingw and chooses mingw64 instead of mingw 889e4520c8bSEnji Cooper 890e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0d and OpenSSL 1.1.0e [16 Feb 2017] 891e4520c8bSEnji Cooper 892e4520c8bSEnji Cooper * Encrypt-Then-Mac renegotiation crash ([CVE-2017-3733]) 893e4520c8bSEnji Cooper 894e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0c and OpenSSL 1.1.0d [26 Jan 2017] 895e4520c8bSEnji Cooper 896e4520c8bSEnji Cooper * Truncated packet could crash via OOB read ([CVE-2017-3731]) 897e4520c8bSEnji Cooper * Bad (EC)DHE parameters cause a client crash ([CVE-2017-3730]) 898e4520c8bSEnji Cooper * BN_mod_exp may produce incorrect results on x86_64 ([CVE-2017-3732]) 899e4520c8bSEnji Cooper 900e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0b and OpenSSL 1.1.0c [10 Nov 2016] 901e4520c8bSEnji Cooper 902e4520c8bSEnji Cooper * ChaCha20/Poly1305 heap-buffer-overflow ([CVE-2016-7054]) 903e4520c8bSEnji Cooper * CMS Null dereference ([CVE-2016-7053]) 904e4520c8bSEnji Cooper * Montgomery multiplication may produce incorrect results ([CVE-2016-7055]) 905e4520c8bSEnji Cooper 906e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0a and OpenSSL 1.1.0b [26 Sep 2016] 907e4520c8bSEnji Cooper 908e4520c8bSEnji Cooper * Fix Use After Free for large message sizes ([CVE-2016-6309]) 909e4520c8bSEnji Cooper 910e4520c8bSEnji Cooper### Major changes between OpenSSL 1.1.0 and OpenSSL 1.1.0a [22 Sep 2016] 911e4520c8bSEnji Cooper 912e4520c8bSEnji Cooper * OCSP Status Request extension unbounded memory growth ([CVE-2016-6304]) 913e4520c8bSEnji Cooper * SSL_peek() hang on empty record ([CVE-2016-6305]) 914e4520c8bSEnji Cooper * Excessive allocation of memory in tls_get_message_header() 915e4520c8bSEnji Cooper ([CVE-2016-6307]) 916e4520c8bSEnji Cooper * Excessive allocation of memory in dtls1_preprocess_fragment() 917e4520c8bSEnji Cooper ([CVE-2016-6308]) 918e4520c8bSEnji Cooper 919e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2h and OpenSSL 1.1.0 [25 Aug 2016] 920e4520c8bSEnji Cooper 921e4520c8bSEnji Cooper * Copyright text was shrunk to a boilerplate that points to the license 922e4520c8bSEnji Cooper * "shared" builds are now the default when possible 923e4520c8bSEnji Cooper * Added support for "pipelining" 924e4520c8bSEnji Cooper * Added the AFALG engine 925e4520c8bSEnji Cooper * New threading API implemented 926e4520c8bSEnji Cooper * Support for ChaCha20 and Poly1305 added to libcrypto and libssl 927e4520c8bSEnji Cooper * Support for extended master secret 928e4520c8bSEnji Cooper * CCM ciphersuites 929e4520c8bSEnji Cooper * Reworked test suite, now based on perl, Test::Harness and Test::More 930e4520c8bSEnji Cooper * *Most* libcrypto and libssl public structures were made opaque, 931e4520c8bSEnji Cooper including: 932e4520c8bSEnji Cooper BIGNUM and associated types, EC_KEY and EC_KEY_METHOD, 933e4520c8bSEnji Cooper DH and DH_METHOD, DSA and DSA_METHOD, RSA and RSA_METHOD, 934e4520c8bSEnji Cooper BIO and BIO_METHOD, EVP_MD_CTX, EVP_MD, EVP_CIPHER_CTX, 935e4520c8bSEnji Cooper EVP_CIPHER, EVP_PKEY and associated types, HMAC_CTX, 936e4520c8bSEnji Cooper X509, X509_CRL, X509_OBJECT, X509_STORE_CTX, X509_STORE, 937e4520c8bSEnji Cooper X509_LOOKUP, X509_LOOKUP_METHOD 938e4520c8bSEnji Cooper * libssl internal structures made opaque 939e4520c8bSEnji Cooper * SSLv2 support removed 940e4520c8bSEnji Cooper * Kerberos ciphersuite support removed 941e4520c8bSEnji Cooper * RC4 removed from DEFAULT ciphersuites in libssl 942e4520c8bSEnji Cooper * 40 and 56 bit cipher support removed from libssl 943e4520c8bSEnji Cooper * All public header files moved to include/openssl, no more symlinking 944e4520c8bSEnji Cooper * SSL/TLS state machine, version negotiation and record layer rewritten 945e4520c8bSEnji Cooper * EC revision: now operations use new EC_KEY_METHOD. 946e4520c8bSEnji Cooper * Support for OCB mode added to libcrypto 947e4520c8bSEnji Cooper * Support for asynchronous crypto operations added to libcrypto and libssl 948e4520c8bSEnji Cooper * Deprecated interfaces can now be disabled at build time either 949e4520c8bSEnji Cooper relative to the latest release via the "no-deprecated" Configure 950e4520c8bSEnji Cooper argument, or via the "--api=1.1.0|1.0.0|0.9.8" option. 951e4520c8bSEnji Cooper * Application software can be compiled with -DOPENSSL_API_COMPAT=version 952e4520c8bSEnji Cooper to ensure that features deprecated in that version are not exposed. 953e4520c8bSEnji Cooper * Support for RFC6698/RFC7671 DANE TLSA peer authentication 954e4520c8bSEnji Cooper * Change of Configure to use --prefix as the main installation 955e4520c8bSEnji Cooper directory location rather than --openssldir. The latter becomes 956e4520c8bSEnji Cooper the directory for certs, private key and openssl.cnf exclusively. 957e4520c8bSEnji Cooper * Reworked BIO networking library, with full support for IPv6. 958e4520c8bSEnji Cooper * New "unified" build system 959e4520c8bSEnji Cooper * New security levels 960e4520c8bSEnji Cooper * Support for scrypt algorithm 961e4520c8bSEnji Cooper * Support for X25519 962e4520c8bSEnji Cooper * Extended SSL_CONF support using configuration files 963e4520c8bSEnji Cooper * KDF algorithm support. Implement TLS PRF as a KDF. 964e4520c8bSEnji Cooper * Support for Certificate Transparency 965e4520c8bSEnji Cooper * HKDF support. 966e4520c8bSEnji Cooper 967e4520c8bSEnji CooperOpenSSL 1.0.2 968e4520c8bSEnji Cooper------------- 969e4520c8bSEnji Cooper 970e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2s and OpenSSL 1.0.2t [10 Sep 2019] 971e4520c8bSEnji Cooper 972e4520c8bSEnji Cooper * Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey 973e4520c8bSEnji Cooper ([CVE-2019-1563]) 974e4520c8bSEnji Cooper * For built-in EC curves, ensure an EC_GROUP built from the curve name is 975e4520c8bSEnji Cooper used even when parsing explicit parameters 976e4520c8bSEnji Cooper * Compute ECC cofactors if not provided during EC_GROUP construction 977e4520c8bSEnji Cooper ([CVE-2019-1547]) 978e4520c8bSEnji Cooper * Document issue with installation paths in diverse Windows builds 979e4520c8bSEnji Cooper ([CVE-2019-1552]) 980e4520c8bSEnji Cooper 981e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2r and OpenSSL 1.0.2s [28 May 2019] 982e4520c8bSEnji Cooper 983e4520c8bSEnji Cooper * None 984e4520c8bSEnji Cooper 985e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2q and OpenSSL 1.0.2r [26 Feb 2019] 986e4520c8bSEnji Cooper 987e4520c8bSEnji Cooper * 0-byte record padding oracle ([CVE-2019-1559]) 988e4520c8bSEnji Cooper 989e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2p and OpenSSL 1.0.2q [20 Nov 2018] 990e4520c8bSEnji Cooper 991e4520c8bSEnji Cooper * Microarchitecture timing vulnerability in ECC scalar multiplication ([CVE-2018-5407]) 992e4520c8bSEnji Cooper * Timing vulnerability in DSA signature generation ([CVE-2018-0734]) 993e4520c8bSEnji Cooper 994e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2o and OpenSSL 1.0.2p [14 Aug 2018] 995e4520c8bSEnji Cooper 996e4520c8bSEnji Cooper * Client DoS due to large DH parameter ([CVE-2018-0732]) 997e4520c8bSEnji Cooper * Cache timing vulnerability in RSA Key Generation ([CVE-2018-0737]) 998e4520c8bSEnji Cooper 999e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2n and OpenSSL 1.0.2o [27 Mar 2018] 1000e4520c8bSEnji Cooper 1001e4520c8bSEnji Cooper * Constructed ASN.1 types with a recursive definition could exceed the 1002e4520c8bSEnji Cooper stack ([CVE-2018-0739]) 1003e4520c8bSEnji Cooper 1004e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2m and OpenSSL 1.0.2n [7 Dec 2017] 1005e4520c8bSEnji Cooper 1006e4520c8bSEnji Cooper * Read/write after SSL object in error state ([CVE-2017-3737]) 1007e4520c8bSEnji Cooper * rsaz_1024_mul_avx2 overflow bug on x86_64 ([CVE-2017-3738]) 1008e4520c8bSEnji Cooper 1009e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2l and OpenSSL 1.0.2m [2 Nov 2017] 1010e4520c8bSEnji Cooper 1011e4520c8bSEnji Cooper * bn_sqrx8x_internal carry bug on x86_64 ([CVE-2017-3736]) 1012e4520c8bSEnji Cooper * Malformed X.509 IPAddressFamily could cause OOB read ([CVE-2017-3735]) 1013e4520c8bSEnji Cooper 1014e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2k and OpenSSL 1.0.2l [25 May 2017] 1015e4520c8bSEnji Cooper 1016e4520c8bSEnji Cooper * config now recognises 64-bit mingw and chooses mingw64 instead of mingw 1017e4520c8bSEnji Cooper 1018e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2j and OpenSSL 1.0.2k [26 Jan 2017] 1019e4520c8bSEnji Cooper 1020e4520c8bSEnji Cooper * Truncated packet could crash via OOB read ([CVE-2017-3731]) 1021e4520c8bSEnji Cooper * BN_mod_exp may produce incorrect results on x86_64 ([CVE-2017-3732]) 1022e4520c8bSEnji Cooper * Montgomery multiplication may produce incorrect results ([CVE-2016-7055]) 1023e4520c8bSEnji Cooper 1024e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2i and OpenSSL 1.0.2j [26 Sep 2016] 1025e4520c8bSEnji Cooper 1026e4520c8bSEnji Cooper * Missing CRL sanity check ([CVE-2016-7052]) 1027e4520c8bSEnji Cooper 1028e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2h and OpenSSL 1.0.2i [22 Sep 2016] 1029e4520c8bSEnji Cooper 1030e4520c8bSEnji Cooper * OCSP Status Request extension unbounded memory growth ([CVE-2016-6304]) 1031e4520c8bSEnji Cooper * SWEET32 Mitigation ([CVE-2016-2183]) 1032e4520c8bSEnji Cooper * OOB write in MDC2_Update() ([CVE-2016-6303]) 1033e4520c8bSEnji Cooper * Malformed SHA512 ticket DoS ([CVE-2016-6302]) 1034e4520c8bSEnji Cooper * OOB write in BN_bn2dec() ([CVE-2016-2182]) 1035e4520c8bSEnji Cooper * OOB read in TS_OBJ_print_bio() ([CVE-2016-2180]) 1036e4520c8bSEnji Cooper * Pointer arithmetic undefined behaviour ([CVE-2016-2177]) 1037e4520c8bSEnji Cooper * Constant time flag not preserved in DSA signing ([CVE-2016-2178]) 1038e4520c8bSEnji Cooper * DTLS buffered message DoS ([CVE-2016-2179]) 1039e4520c8bSEnji Cooper * DTLS replay protection DoS ([CVE-2016-2181]) 1040e4520c8bSEnji Cooper * Certificate message OOB reads ([CVE-2016-6306]) 1041e4520c8bSEnji Cooper 1042e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2g and OpenSSL 1.0.2h [3 May 2016] 1043e4520c8bSEnji Cooper 1044e4520c8bSEnji Cooper * Prevent padding oracle in AES-NI CBC MAC check ([CVE-2016-2107]) 1045e4520c8bSEnji Cooper * Fix EVP_EncodeUpdate overflow ([CVE-2016-2105]) 1046e4520c8bSEnji Cooper * Fix EVP_EncryptUpdate overflow ([CVE-2016-2106]) 1047e4520c8bSEnji Cooper * Prevent ASN.1 BIO excessive memory allocation ([CVE-2016-2109]) 1048e4520c8bSEnji Cooper * EBCDIC overread ([CVE-2016-2176]) 1049e4520c8bSEnji Cooper * Modify behavior of ALPN to invoke callback after SNI/servername 1050e4520c8bSEnji Cooper callback, such that updates to the SSL_CTX affect ALPN. 1051e4520c8bSEnji Cooper * Remove LOW from the DEFAULT cipher list. This removes singles DES from 1052e4520c8bSEnji Cooper the default. 1053e4520c8bSEnji Cooper * Only remove the SSLv2 methods with the no-ssl2-method option. 1054e4520c8bSEnji Cooper 1055e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2f and OpenSSL 1.0.2g [1 Mar 2016] 1056e4520c8bSEnji Cooper 1057e4520c8bSEnji Cooper * Disable weak ciphers in SSLv3 and up in default builds of OpenSSL. 1058e4520c8bSEnji Cooper * Disable SSLv2 default build, default negotiation and weak ciphers 1059e4520c8bSEnji Cooper ([CVE-2016-0800]) 1060e4520c8bSEnji Cooper * Fix a double-free in DSA code ([CVE-2016-0705]) 1061e4520c8bSEnji Cooper * Disable SRP fake user seed to address a server memory leak 1062e4520c8bSEnji Cooper ([CVE-2016-0798]) 1063e4520c8bSEnji Cooper * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption 1064e4520c8bSEnji Cooper ([CVE-2016-0797]) 1065e4520c8bSEnji Cooper * Fix memory issues in BIO_*printf functions ([CVE-2016-0799]) 1066e4520c8bSEnji Cooper * Fix side channel attack on modular exponentiation ([CVE-2016-0702]) 1067e4520c8bSEnji Cooper 1068e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2e and OpenSSL 1.0.2f [28 Jan 2016] 1069e4520c8bSEnji Cooper 1070e4520c8bSEnji Cooper * DH small subgroups ([CVE-2016-0701]) 1071e4520c8bSEnji Cooper * SSLv2 doesn't block disabled ciphers ([CVE-2015-3197]) 1072e4520c8bSEnji Cooper 1073e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2d and OpenSSL 1.0.2e [3 Dec 2015] 1074e4520c8bSEnji Cooper 1075e4520c8bSEnji Cooper * BN_mod_exp may produce incorrect results on x86_64 ([CVE-2015-3193]) 1076e4520c8bSEnji Cooper * Certificate verify crash with missing PSS parameter ([CVE-2015-3194]) 1077e4520c8bSEnji Cooper * X509_ATTRIBUTE memory leak ([CVE-2015-3195]) 1078e4520c8bSEnji Cooper * Rewrite EVP_DecodeUpdate (base64 decoding) to fix several bugs 1079e4520c8bSEnji Cooper * In DSA_generate_parameters_ex, if the provided seed is too short, 1080e4520c8bSEnji Cooper return an error 1081e4520c8bSEnji Cooper 1082e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2c and OpenSSL 1.0.2d [9 Jul 2015] 1083e4520c8bSEnji Cooper 1084e4520c8bSEnji Cooper * Alternate chains certificate forgery ([CVE-2015-1793]) 1085e4520c8bSEnji Cooper * Race condition handling PSK identify hint ([CVE-2015-3196]) 1086e4520c8bSEnji Cooper 1087e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2b and OpenSSL 1.0.2c [12 Jun 2015] 1088e4520c8bSEnji Cooper 1089e4520c8bSEnji Cooper * Fix HMAC ABI incompatibility 1090e4520c8bSEnji Cooper 1091e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2a and OpenSSL 1.0.2b [11 Jun 2015] 1092e4520c8bSEnji Cooper 1093e4520c8bSEnji Cooper * Malformed ECParameters causes infinite loop ([CVE-2015-1788]) 1094e4520c8bSEnji Cooper * Exploitable out-of-bounds read in X509_cmp_time ([CVE-2015-1789]) 1095e4520c8bSEnji Cooper * PKCS7 crash with missing EnvelopedContent ([CVE-2015-1790]) 1096e4520c8bSEnji Cooper * CMS verify infinite loop with unknown hash function ([CVE-2015-1792]) 1097e4520c8bSEnji Cooper * Race condition handling NewSessionTicket ([CVE-2015-1791]) 1098e4520c8bSEnji Cooper 1099e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.2 and OpenSSL 1.0.2a [19 Mar 2015] 1100e4520c8bSEnji Cooper 1101e4520c8bSEnji Cooper * OpenSSL 1.0.2 ClientHello sigalgs DoS fix ([CVE-2015-0291]) 1102e4520c8bSEnji Cooper * Multiblock corrupted pointer fix ([CVE-2015-0290]) 1103e4520c8bSEnji Cooper * Segmentation fault in DTLSv1_listen fix ([CVE-2015-0207]) 1104e4520c8bSEnji Cooper * Segmentation fault in ASN1_TYPE_cmp fix ([CVE-2015-0286]) 1105e4520c8bSEnji Cooper * Segmentation fault for invalid PSS parameters fix ([CVE-2015-0208]) 1106e4520c8bSEnji Cooper * ASN.1 structure reuse memory corruption fix ([CVE-2015-0287]) 1107e4520c8bSEnji Cooper * PKCS7 NULL pointer dereferences fix ([CVE-2015-0289]) 1108e4520c8bSEnji Cooper * DoS via reachable assert in SSLv2 servers fix ([CVE-2015-0293]) 1109e4520c8bSEnji Cooper * Empty CKE with client auth and DHE fix ([CVE-2015-1787]) 1110e4520c8bSEnji Cooper * Handshake with unseeded PRNG fix ([CVE-2015-0285]) 1111e4520c8bSEnji Cooper * Use After Free following d2i_ECPrivatekey error fix ([CVE-2015-0209]) 1112e4520c8bSEnji Cooper * X509_to_X509_REQ NULL pointer deref fix ([CVE-2015-0288]) 1113e4520c8bSEnji Cooper * Removed the export ciphers from the DEFAULT ciphers 1114e4520c8bSEnji Cooper 1115e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1l and OpenSSL 1.0.2 [22 Jan 2015] 1116e4520c8bSEnji Cooper 1117e4520c8bSEnji Cooper * Suite B support for TLS 1.2 and DTLS 1.2 1118e4520c8bSEnji Cooper * Support for DTLS 1.2 1119e4520c8bSEnji Cooper * TLS automatic EC curve selection. 1120e4520c8bSEnji Cooper * API to set TLS supported signature algorithms and curves 1121e4520c8bSEnji Cooper * SSL_CONF configuration API. 1122e4520c8bSEnji Cooper * TLS Brainpool support. 1123e4520c8bSEnji Cooper * ALPN support. 1124e4520c8bSEnji Cooper * CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH. 1125e4520c8bSEnji Cooper 1126e4520c8bSEnji CooperOpenSSL 1.0.1 1127e4520c8bSEnji Cooper------------- 1128e4520c8bSEnji Cooper 1129e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1t and OpenSSL 1.0.1u [22 Sep 2016] 1130e4520c8bSEnji Cooper 1131e4520c8bSEnji Cooper * OCSP Status Request extension unbounded memory growth ([CVE-2016-6304]) 1132e4520c8bSEnji Cooper * SWEET32 Mitigation ([CVE-2016-2183]) 1133e4520c8bSEnji Cooper * OOB write in MDC2_Update() ([CVE-2016-6303]) 1134e4520c8bSEnji Cooper * Malformed SHA512 ticket DoS ([CVE-2016-6302]) 1135e4520c8bSEnji Cooper * OOB write in BN_bn2dec() ([CVE-2016-2182]) 1136e4520c8bSEnji Cooper * OOB read in TS_OBJ_print_bio() ([CVE-2016-2180]) 1137e4520c8bSEnji Cooper * Pointer arithmetic undefined behaviour ([CVE-2016-2177]) 1138e4520c8bSEnji Cooper * Constant time flag not preserved in DSA signing ([CVE-2016-2178]) 1139e4520c8bSEnji Cooper * DTLS buffered message DoS ([CVE-2016-2179]) 1140e4520c8bSEnji Cooper * DTLS replay protection DoS ([CVE-2016-2181]) 1141e4520c8bSEnji Cooper * Certificate message OOB reads ([CVE-2016-6306]) 1142e4520c8bSEnji Cooper 1143e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1s and OpenSSL 1.0.1t [3 May 2016] 1144e4520c8bSEnji Cooper 1145e4520c8bSEnji Cooper * Prevent padding oracle in AES-NI CBC MAC check ([CVE-2016-2107]) 1146e4520c8bSEnji Cooper * Fix EVP_EncodeUpdate overflow ([CVE-2016-2105]) 1147e4520c8bSEnji Cooper * Fix EVP_EncryptUpdate overflow ([CVE-2016-2106]) 1148e4520c8bSEnji Cooper * Prevent ASN.1 BIO excessive memory allocation ([CVE-2016-2109]) 1149e4520c8bSEnji Cooper * EBCDIC overread ([CVE-2016-2176]) 1150e4520c8bSEnji Cooper * Modify behavior of ALPN to invoke callback after SNI/servername 1151e4520c8bSEnji Cooper callback, such that updates to the SSL_CTX affect ALPN. 1152e4520c8bSEnji Cooper * Remove LOW from the DEFAULT cipher list. This removes singles DES from 1153e4520c8bSEnji Cooper the default. 1154e4520c8bSEnji Cooper * Only remove the SSLv2 methods with the no-ssl2-method option. 1155e4520c8bSEnji Cooper 1156e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1r and OpenSSL 1.0.1s [1 Mar 2016] 1157e4520c8bSEnji Cooper 1158e4520c8bSEnji Cooper * Disable weak ciphers in SSLv3 and up in default builds of OpenSSL. 1159e4520c8bSEnji Cooper * Disable SSLv2 default build, default negotiation and weak ciphers 1160e4520c8bSEnji Cooper ([CVE-2016-0800]) 1161e4520c8bSEnji Cooper * Fix a double-free in DSA code ([CVE-2016-0705]) 1162e4520c8bSEnji Cooper * Disable SRP fake user seed to address a server memory leak 1163e4520c8bSEnji Cooper ([CVE-2016-0798]) 1164e4520c8bSEnji Cooper * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption 1165e4520c8bSEnji Cooper ([CVE-2016-0797]) 1166e4520c8bSEnji Cooper * Fix memory issues in BIO_*printf functions ([CVE-2016-0799]) 1167e4520c8bSEnji Cooper * Fix side channel attack on modular exponentiation ([CVE-2016-0702]) 1168e4520c8bSEnji Cooper 1169e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1q and OpenSSL 1.0.1r [28 Jan 2016] 1170e4520c8bSEnji Cooper 1171e4520c8bSEnji Cooper * Protection for DH small subgroup attacks 1172e4520c8bSEnji Cooper * SSLv2 doesn't block disabled ciphers ([CVE-2015-3197]) 1173e4520c8bSEnji Cooper 1174e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1p and OpenSSL 1.0.1q [3 Dec 2015] 1175e4520c8bSEnji Cooper 1176e4520c8bSEnji Cooper * Certificate verify crash with missing PSS parameter ([CVE-2015-3194]) 1177e4520c8bSEnji Cooper * X509_ATTRIBUTE memory leak ([CVE-2015-3195]) 1178e4520c8bSEnji Cooper * Rewrite EVP_DecodeUpdate (base64 decoding) to fix several bugs 1179e4520c8bSEnji Cooper * In DSA_generate_parameters_ex, if the provided seed is too short, 1180e4520c8bSEnji Cooper return an error 1181e4520c8bSEnji Cooper 1182e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1o and OpenSSL 1.0.1p [9 Jul 2015] 1183e4520c8bSEnji Cooper 1184e4520c8bSEnji Cooper * Alternate chains certificate forgery ([CVE-2015-1793]) 1185e4520c8bSEnji Cooper * Race condition handling PSK identify hint ([CVE-2015-3196]) 1186e4520c8bSEnji Cooper 1187e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1n and OpenSSL 1.0.1o [12 Jun 2015] 1188e4520c8bSEnji Cooper 1189e4520c8bSEnji Cooper * Fix HMAC ABI incompatibility 1190e4520c8bSEnji Cooper 1191e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1m and OpenSSL 1.0.1n [11 Jun 2015] 1192e4520c8bSEnji Cooper 1193e4520c8bSEnji Cooper * Malformed ECParameters causes infinite loop ([CVE-2015-1788]) 1194e4520c8bSEnji Cooper * Exploitable out-of-bounds read in X509_cmp_time ([CVE-2015-1789]) 1195e4520c8bSEnji Cooper * PKCS7 crash with missing EnvelopedContent ([CVE-2015-1790]) 1196e4520c8bSEnji Cooper * CMS verify infinite loop with unknown hash function ([CVE-2015-1792]) 1197e4520c8bSEnji Cooper * Race condition handling NewSessionTicket ([CVE-2015-1791]) 1198e4520c8bSEnji Cooper 1199e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1l and OpenSSL 1.0.1m [19 Mar 2015] 1200e4520c8bSEnji Cooper 1201e4520c8bSEnji Cooper * Segmentation fault in ASN1_TYPE_cmp fix ([CVE-2015-0286]) 1202e4520c8bSEnji Cooper * ASN.1 structure reuse memory corruption fix ([CVE-2015-0287]) 1203e4520c8bSEnji Cooper * PKCS7 NULL pointer dereferences fix ([CVE-2015-0289]) 1204e4520c8bSEnji Cooper * DoS via reachable assert in SSLv2 servers fix ([CVE-2015-0293]) 1205e4520c8bSEnji Cooper * Use After Free following d2i_ECPrivatekey error fix ([CVE-2015-0209]) 1206e4520c8bSEnji Cooper * X509_to_X509_REQ NULL pointer deref fix ([CVE-2015-0288]) 1207e4520c8bSEnji Cooper * Removed the export ciphers from the DEFAULT ciphers 1208e4520c8bSEnji Cooper 1209e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1k and OpenSSL 1.0.1l [15 Jan 2015] 1210e4520c8bSEnji Cooper 1211e4520c8bSEnji Cooper * Build fixes for the Windows and OpenVMS platforms 1212e4520c8bSEnji Cooper 1213e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1j and OpenSSL 1.0.1k [8 Jan 2015] 1214e4520c8bSEnji Cooper 1215e4520c8bSEnji Cooper * Fix for [CVE-2014-3571] 1216e4520c8bSEnji Cooper * Fix for [CVE-2015-0206] 1217e4520c8bSEnji Cooper * Fix for [CVE-2014-3569] 1218e4520c8bSEnji Cooper * Fix for [CVE-2014-3572] 1219e4520c8bSEnji Cooper * Fix for [CVE-2015-0204] 1220e4520c8bSEnji Cooper * Fix for [CVE-2015-0205] 1221e4520c8bSEnji Cooper * Fix for [CVE-2014-8275] 1222e4520c8bSEnji Cooper * Fix for [CVE-2014-3570] 1223e4520c8bSEnji Cooper 1224e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1i and OpenSSL 1.0.1j [15 Oct 2014] 1225e4520c8bSEnji Cooper 1226e4520c8bSEnji Cooper * Fix for [CVE-2014-3513] 1227e4520c8bSEnji Cooper * Fix for [CVE-2014-3567] 1228e4520c8bSEnji Cooper * Mitigation for [CVE-2014-3566] (SSL protocol vulnerability) 1229e4520c8bSEnji Cooper * Fix for [CVE-2014-3568] 1230e4520c8bSEnji Cooper 1231e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1h and OpenSSL 1.0.1i [6 Aug 2014] 1232e4520c8bSEnji Cooper 1233e4520c8bSEnji Cooper * Fix for [CVE-2014-3512] 1234e4520c8bSEnji Cooper * Fix for [CVE-2014-3511] 1235e4520c8bSEnji Cooper * Fix for [CVE-2014-3510] 1236e4520c8bSEnji Cooper * Fix for [CVE-2014-3507] 1237e4520c8bSEnji Cooper * Fix for [CVE-2014-3506] 1238e4520c8bSEnji Cooper * Fix for [CVE-2014-3505] 1239e4520c8bSEnji Cooper * Fix for [CVE-2014-3509] 1240e4520c8bSEnji Cooper * Fix for [CVE-2014-5139] 1241e4520c8bSEnji Cooper * Fix for [CVE-2014-3508] 1242e4520c8bSEnji Cooper 1243e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1g and OpenSSL 1.0.1h [5 Jun 2014] 1244e4520c8bSEnji Cooper 1245e4520c8bSEnji Cooper * Fix for [CVE-2014-0224] 1246e4520c8bSEnji Cooper * Fix for [CVE-2014-0221] 1247e4520c8bSEnji Cooper * Fix for [CVE-2014-0198] 1248e4520c8bSEnji Cooper * Fix for [CVE-2014-0195] 1249e4520c8bSEnji Cooper * Fix for [CVE-2014-3470] 1250e4520c8bSEnji Cooper * Fix for [CVE-2010-5298] 1251e4520c8bSEnji Cooper 1252e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1f and OpenSSL 1.0.1g [7 Apr 2014] 1253e4520c8bSEnji Cooper 1254e4520c8bSEnji Cooper * Fix for [CVE-2014-0160] 1255e4520c8bSEnji Cooper * Add TLS padding extension workaround for broken servers. 1256e4520c8bSEnji Cooper * Fix for [CVE-2014-0076] 1257e4520c8bSEnji Cooper 1258e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1e and OpenSSL 1.0.1f [6 Jan 2014] 1259e4520c8bSEnji Cooper 1260e4520c8bSEnji Cooper * Don't include gmt_unix_time in TLS server and client random values 1261e4520c8bSEnji Cooper * Fix for TLS record tampering bug ([CVE-2013-4353]) 1262e4520c8bSEnji Cooper * Fix for TLS version checking bug ([CVE-2013-6449]) 1263e4520c8bSEnji Cooper * Fix for DTLS retransmission bug ([CVE-2013-6450]) 1264e4520c8bSEnji Cooper 1265e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1d and OpenSSL 1.0.1e [11 Feb 2013] 1266e4520c8bSEnji Cooper 1267e4520c8bSEnji Cooper * Corrected fix for ([CVE-2013-0169]) 1268e4520c8bSEnji Cooper 1269e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1c and OpenSSL 1.0.1d [4 Feb 2013] 1270e4520c8bSEnji Cooper 1271e4520c8bSEnji Cooper * Fix renegotiation in TLS 1.1, 1.2 by using the correct TLS version. 1272e4520c8bSEnji Cooper * Include the fips configuration module. 1273e4520c8bSEnji Cooper * Fix OCSP bad key DoS attack ([CVE-2013-0166]) 1274e4520c8bSEnji Cooper * Fix for SSL/TLS/DTLS CBC plaintext recovery attack ([CVE-2013-0169]) 1275e4520c8bSEnji Cooper * Fix for TLS AESNI record handling flaw ([CVE-2012-2686]) 1276e4520c8bSEnji Cooper 1277e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1b and OpenSSL 1.0.1c [10 May 2012] 1278e4520c8bSEnji Cooper 1279e4520c8bSEnji Cooper * Fix TLS/DTLS record length checking bug ([CVE-2012-2333]) 1280e4520c8bSEnji Cooper * Don't attempt to use non-FIPS composite ciphers in FIPS mode. 1281e4520c8bSEnji Cooper 1282e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1a and OpenSSL 1.0.1b [26 Apr 2012] 1283e4520c8bSEnji Cooper 1284e4520c8bSEnji Cooper * Fix compilation error on non-x86 platforms. 1285e4520c8bSEnji Cooper * Make FIPS capable OpenSSL ciphers work in non-FIPS mode. 1286e4520c8bSEnji Cooper * Fix SSL_OP_NO_TLSv1_1 clash with SSL_OP_ALL in OpenSSL 1.0.0 1287e4520c8bSEnji Cooper 1288e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.1 and OpenSSL 1.0.1a [19 Apr 2012] 1289e4520c8bSEnji Cooper 1290e4520c8bSEnji Cooper * Fix for ASN1 overflow bug ([CVE-2012-2110]) 1291e4520c8bSEnji Cooper * Workarounds for some servers that hang on long client hellos. 1292e4520c8bSEnji Cooper * Fix SEGV in AES code. 1293e4520c8bSEnji Cooper 1294e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.1 [14 Mar 2012] 1295e4520c8bSEnji Cooper 1296e4520c8bSEnji Cooper * TLS/DTLS heartbeat support. 1297e4520c8bSEnji Cooper * SCTP support. 1298e4520c8bSEnji Cooper * RFC 5705 TLS key material exporter. 1299e4520c8bSEnji Cooper * RFC 5764 DTLS-SRTP negotiation. 1300e4520c8bSEnji Cooper * Next Protocol Negotiation. 1301e4520c8bSEnji Cooper * PSS signatures in certificates, requests and CRLs. 1302e4520c8bSEnji Cooper * Support for password based recipient info for CMS. 1303e4520c8bSEnji Cooper * Support TLS v1.2 and TLS v1.1. 1304e4520c8bSEnji Cooper * Preliminary FIPS capability for unvalidated 2.0 FIPS module. 1305e4520c8bSEnji Cooper * SRP support. 1306e4520c8bSEnji Cooper 1307e4520c8bSEnji CooperOpenSSL 1.0.0 1308e4520c8bSEnji Cooper------------- 1309e4520c8bSEnji Cooper 1310e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0s and OpenSSL 1.0.0t [3 Dec 2015] 1311e4520c8bSEnji Cooper 1312e4520c8bSEnji Cooper * X509_ATTRIBUTE memory leak (([CVE-2015-3195])) 1313e4520c8bSEnji Cooper * Race condition handling PSK identify hint ([CVE-2015-3196]) 1314e4520c8bSEnji Cooper 1315e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0r and OpenSSL 1.0.0s [11 Jun 2015] 1316e4520c8bSEnji Cooper 1317e4520c8bSEnji Cooper * Malformed ECParameters causes infinite loop ([CVE-2015-1788]) 1318e4520c8bSEnji Cooper * Exploitable out-of-bounds read in X509_cmp_time ([CVE-2015-1789]) 1319e4520c8bSEnji Cooper * PKCS7 crash with missing EnvelopedContent ([CVE-2015-1790]) 1320e4520c8bSEnji Cooper * CMS verify infinite loop with unknown hash function ([CVE-2015-1792]) 1321e4520c8bSEnji Cooper * Race condition handling NewSessionTicket ([CVE-2015-1791]) 1322e4520c8bSEnji Cooper 1323e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0q and OpenSSL 1.0.0r [19 Mar 2015] 1324e4520c8bSEnji Cooper 1325e4520c8bSEnji Cooper * Segmentation fault in ASN1_TYPE_cmp fix ([CVE-2015-0286]) 1326e4520c8bSEnji Cooper * ASN.1 structure reuse memory corruption fix ([CVE-2015-0287]) 1327e4520c8bSEnji Cooper * PKCS7 NULL pointer dereferences fix ([CVE-2015-0289]) 1328e4520c8bSEnji Cooper * DoS via reachable assert in SSLv2 servers fix ([CVE-2015-0293]) 1329e4520c8bSEnji Cooper * Use After Free following d2i_ECPrivatekey error fix ([CVE-2015-0209]) 1330e4520c8bSEnji Cooper * X509_to_X509_REQ NULL pointer deref fix ([CVE-2015-0288]) 1331e4520c8bSEnji Cooper * Removed the export ciphers from the DEFAULT ciphers 1332e4520c8bSEnji Cooper 1333e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0p and OpenSSL 1.0.0q [15 Jan 2015] 1334e4520c8bSEnji Cooper 1335e4520c8bSEnji Cooper * Build fixes for the Windows and OpenVMS platforms 1336e4520c8bSEnji Cooper 1337e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0o and OpenSSL 1.0.0p [8 Jan 2015] 1338e4520c8bSEnji Cooper 1339e4520c8bSEnji Cooper * Fix for [CVE-2014-3571] 1340e4520c8bSEnji Cooper * Fix for [CVE-2015-0206] 1341e4520c8bSEnji Cooper * Fix for [CVE-2014-3569] 1342e4520c8bSEnji Cooper * Fix for [CVE-2014-3572] 1343e4520c8bSEnji Cooper * Fix for [CVE-2015-0204] 1344e4520c8bSEnji Cooper * Fix for [CVE-2015-0205] 1345e4520c8bSEnji Cooper * Fix for [CVE-2014-8275] 1346e4520c8bSEnji Cooper * Fix for [CVE-2014-3570] 1347e4520c8bSEnji Cooper 1348e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0n and OpenSSL 1.0.0o [15 Oct 2014] 1349e4520c8bSEnji Cooper 1350e4520c8bSEnji Cooper * Fix for [CVE-2014-3513] 1351e4520c8bSEnji Cooper * Fix for [CVE-2014-3567] 1352e4520c8bSEnji Cooper * Mitigation for [CVE-2014-3566] (SSL protocol vulnerability) 1353e4520c8bSEnji Cooper * Fix for [CVE-2014-3568] 1354e4520c8bSEnji Cooper 1355e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0m and OpenSSL 1.0.0n [6 Aug 2014] 1356e4520c8bSEnji Cooper 1357e4520c8bSEnji Cooper * Fix for [CVE-2014-3510] 1358e4520c8bSEnji Cooper * Fix for [CVE-2014-3507] 1359e4520c8bSEnji Cooper * Fix for [CVE-2014-3506] 1360e4520c8bSEnji Cooper * Fix for [CVE-2014-3505] 1361e4520c8bSEnji Cooper * Fix for [CVE-2014-3509] 1362e4520c8bSEnji Cooper * Fix for [CVE-2014-3508] 1363e4520c8bSEnji Cooper 1364e4520c8bSEnji Cooper Known issues in OpenSSL 1.0.0m: 1365e4520c8bSEnji Cooper 1366e4520c8bSEnji Cooper * EAP-FAST and other applications using tls_session_secret_cb 1367e4520c8bSEnji Cooper won't resume sessions. Fixed in 1.0.0n-dev 1368e4520c8bSEnji Cooper * Compilation failure of s3_pkt.c on some platforms due to missing 1369e4520c8bSEnji Cooper `<limits.h>` include. Fixed in 1.0.0n-dev 1370e4520c8bSEnji Cooper 1371e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0l and OpenSSL 1.0.0m [5 Jun 2014] 1372e4520c8bSEnji Cooper 1373e4520c8bSEnji Cooper * Fix for [CVE-2014-0224] 1374e4520c8bSEnji Cooper * Fix for [CVE-2014-0221] 1375e4520c8bSEnji Cooper * Fix for [CVE-2014-0198] 1376e4520c8bSEnji Cooper * Fix for [CVE-2014-0195] 1377e4520c8bSEnji Cooper * Fix for [CVE-2014-3470] 1378e4520c8bSEnji Cooper * Fix for [CVE-2014-0076] 1379e4520c8bSEnji Cooper * Fix for [CVE-2010-5298] 1380e4520c8bSEnji Cooper 1381e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0k and OpenSSL 1.0.0l [6 Jan 2014] 1382e4520c8bSEnji Cooper 1383e4520c8bSEnji Cooper * Fix for DTLS retransmission bug ([CVE-2013-6450]) 1384e4520c8bSEnji Cooper 1385e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0j and OpenSSL 1.0.0k [5 Feb 2013] 1386e4520c8bSEnji Cooper 1387e4520c8bSEnji Cooper * Fix for SSL/TLS/DTLS CBC plaintext recovery attack ([CVE-2013-0169]) 1388e4520c8bSEnji Cooper * Fix OCSP bad key DoS attack ([CVE-2013-0166]) 1389e4520c8bSEnji Cooper 1390e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0i and OpenSSL 1.0.0j [10 May 2012] 1391e4520c8bSEnji Cooper 1392e4520c8bSEnji Cooper * Fix DTLS record length checking bug ([CVE-2012-2333]) 1393e4520c8bSEnji Cooper 1394e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0h and OpenSSL 1.0.0i [19 Apr 2012] 1395e4520c8bSEnji Cooper 1396e4520c8bSEnji Cooper * Fix for ASN1 overflow bug ([CVE-2012-2110]) 1397e4520c8bSEnji Cooper 1398e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0g and OpenSSL 1.0.0h [12 Mar 2012] 1399e4520c8bSEnji Cooper 1400e4520c8bSEnji Cooper * Fix for CMS/PKCS#7 MMA ([CVE-2012-0884]) 1401e4520c8bSEnji Cooper * Corrected fix for ([CVE-2011-4619]) 1402e4520c8bSEnji Cooper * Various DTLS fixes. 1403e4520c8bSEnji Cooper 1404e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0f and OpenSSL 1.0.0g [18 Jan 2012] 1405e4520c8bSEnji Cooper 1406e4520c8bSEnji Cooper * Fix for DTLS DoS issue ([CVE-2012-0050]) 1407e4520c8bSEnji Cooper 1408e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0e and OpenSSL 1.0.0f [4 Jan 2012] 1409e4520c8bSEnji Cooper 1410e4520c8bSEnji Cooper * Fix for DTLS plaintext recovery attack ([CVE-2011-4108]) 1411e4520c8bSEnji Cooper * Clear block padding bytes of SSL 3.0 records ([CVE-2011-4576]) 1412e4520c8bSEnji Cooper * Only allow one SGC handshake restart for SSL/TLS ([CVE-2011-4619]) 1413e4520c8bSEnji Cooper * Check parameters are not NULL in GOST ENGINE ([CVE-2012-0027]) 1414e4520c8bSEnji Cooper * Check for malformed RFC3779 data ([CVE-2011-4577]) 1415e4520c8bSEnji Cooper 1416e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0d and OpenSSL 1.0.0e [6 Sep 2011] 1417e4520c8bSEnji Cooper 1418e4520c8bSEnji Cooper * Fix for CRL vulnerability issue ([CVE-2011-3207]) 1419e4520c8bSEnji Cooper * Fix for ECDH crashes ([CVE-2011-3210]) 1420e4520c8bSEnji Cooper * Protection against EC timing attacks. 1421e4520c8bSEnji Cooper * Support ECDH ciphersuites for certificates using SHA2 algorithms. 1422e4520c8bSEnji Cooper * Various DTLS fixes. 1423e4520c8bSEnji Cooper 1424e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0c and OpenSSL 1.0.0d [8 Feb 2011] 1425e4520c8bSEnji Cooper 1426e4520c8bSEnji Cooper * Fix for security issue ([CVE-2011-0014]) 1427e4520c8bSEnji Cooper 1428e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0b and OpenSSL 1.0.0c [2 Dec 2010] 1429e4520c8bSEnji Cooper 1430e4520c8bSEnji Cooper * Fix for security issue ([CVE-2010-4180]) 1431e4520c8bSEnji Cooper * Fix for ([CVE-2010-4252]) 1432e4520c8bSEnji Cooper * Fix mishandling of absent EC point format extension. 1433e4520c8bSEnji Cooper * Fix various platform compilation issues. 1434e4520c8bSEnji Cooper * Corrected fix for security issue ([CVE-2010-3864]). 1435e4520c8bSEnji Cooper 1436e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0a and OpenSSL 1.0.0b [16 Nov 2010] 1437e4520c8bSEnji Cooper 1438e4520c8bSEnji Cooper * Fix for security issue ([CVE-2010-3864]). 1439e4520c8bSEnji Cooper * Fix for ([CVE-2010-2939]) 1440e4520c8bSEnji Cooper * Fix WIN32 build system for GOST ENGINE. 1441e4520c8bSEnji Cooper 1442e4520c8bSEnji Cooper### Major changes between OpenSSL 1.0.0 and OpenSSL 1.0.0a [1 Jun 2010] 1443e4520c8bSEnji Cooper 1444e4520c8bSEnji Cooper * Fix for security issue ([CVE-2010-1633]). 1445e4520c8bSEnji Cooper * GOST MAC and CFB fixes. 1446e4520c8bSEnji Cooper 1447e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8n and OpenSSL 1.0.0 [29 Mar 2010] 1448e4520c8bSEnji Cooper 1449e4520c8bSEnji Cooper * RFC3280 path validation: sufficient to process PKITS tests. 1450e4520c8bSEnji Cooper * Integrated support for PVK files and keyblobs. 1451e4520c8bSEnji Cooper * Change default private key format to PKCS#8. 1452e4520c8bSEnji Cooper * CMS support: able to process all examples in RFC4134 1453e4520c8bSEnji Cooper * Streaming ASN1 encode support for PKCS#7 and CMS. 1454e4520c8bSEnji Cooper * Multiple signer and signer add support for PKCS#7 and CMS. 1455e4520c8bSEnji Cooper * ASN1 printing support. 1456e4520c8bSEnji Cooper * Whirlpool hash algorithm added. 1457e4520c8bSEnji Cooper * RFC3161 time stamp support. 1458e4520c8bSEnji Cooper * New generalised public key API supporting ENGINE based algorithms. 1459e4520c8bSEnji Cooper * New generalised public key API utilities. 1460e4520c8bSEnji Cooper * New ENGINE supporting GOST algorithms. 1461e4520c8bSEnji Cooper * SSL/TLS GOST ciphersuite support. 1462e4520c8bSEnji Cooper * PKCS#7 and CMS GOST support. 1463e4520c8bSEnji Cooper * RFC4279 PSK ciphersuite support. 1464e4520c8bSEnji Cooper * Supported points format extension for ECC ciphersuites. 1465e4520c8bSEnji Cooper * ecdsa-with-SHA224/256/384/512 signature types. 1466e4520c8bSEnji Cooper * dsa-with-SHA224 and dsa-with-SHA256 signature types. 1467e4520c8bSEnji Cooper * Opaque PRF Input TLS extension support. 1468e4520c8bSEnji Cooper * Updated time routines to avoid OS limitations. 1469e4520c8bSEnji Cooper 1470e4520c8bSEnji CooperOpenSSL 0.9.x 1471e4520c8bSEnji Cooper------------- 1472e4520c8bSEnji Cooper 1473e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8m and OpenSSL 0.9.8n [24 Mar 2010] 1474e4520c8bSEnji Cooper 1475e4520c8bSEnji Cooper * CFB cipher definition fixes. 1476e4520c8bSEnji Cooper * Fix security issues [CVE-2010-0740] and [CVE-2010-0433]. 1477e4520c8bSEnji Cooper 1478e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8l and OpenSSL 0.9.8m [25 Feb 2010] 1479e4520c8bSEnji Cooper 1480e4520c8bSEnji Cooper * Cipher definition fixes. 1481e4520c8bSEnji Cooper * Workaround for slow RAND_poll() on some WIN32 versions. 1482e4520c8bSEnji Cooper * Remove MD2 from algorithm tables. 1483e4520c8bSEnji Cooper * SPKAC handling fixes. 1484e4520c8bSEnji Cooper * Support for RFC5746 TLS renegotiation extension. 1485e4520c8bSEnji Cooper * Compression memory leak fixed. 1486e4520c8bSEnji Cooper * Compression session resumption fixed. 1487e4520c8bSEnji Cooper * Ticket and SNI coexistence fixes. 1488e4520c8bSEnji Cooper * Many fixes to DTLS handling. 1489e4520c8bSEnji Cooper 1490e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8k and OpenSSL 0.9.8l [5 Nov 2009] 1491e4520c8bSEnji Cooper 1492e4520c8bSEnji Cooper * Temporary work around for [CVE-2009-3555]: disable renegotiation. 1493e4520c8bSEnji Cooper 1494e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8j and OpenSSL 0.9.8k [25 Mar 2009] 1495e4520c8bSEnji Cooper 1496e4520c8bSEnji Cooper * Fix various build issues. 1497e4520c8bSEnji Cooper * Fix security issues [CVE-2009-0590], [CVE-2009-0591], [CVE-2009-0789] 1498e4520c8bSEnji Cooper 1499e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8i and OpenSSL 0.9.8j [7 Jan 2009] 1500e4520c8bSEnji Cooper 1501e4520c8bSEnji Cooper * Fix security issue ([CVE-2008-5077]) 1502e4520c8bSEnji Cooper * Merge FIPS 140-2 branch code. 1503e4520c8bSEnji Cooper 1504e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8g and OpenSSL 0.9.8h [28 May 2008] 1505e4520c8bSEnji Cooper 1506e4520c8bSEnji Cooper * CryptoAPI ENGINE support. 1507e4520c8bSEnji Cooper * Various precautionary measures. 1508e4520c8bSEnji Cooper * Fix for bugs affecting certificate request creation. 1509e4520c8bSEnji Cooper * Support for local machine keyset attribute in PKCS#12 files. 1510e4520c8bSEnji Cooper 1511e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8f and OpenSSL 0.9.8g [19 Oct 2007] 1512e4520c8bSEnji Cooper 1513e4520c8bSEnji Cooper * Backport of CMS functionality to 0.9.8. 1514e4520c8bSEnji Cooper * Fixes for bugs introduced with 0.9.8f. 1515e4520c8bSEnji Cooper 1516e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8e and OpenSSL 0.9.8f [11 Oct 2007] 1517e4520c8bSEnji Cooper 1518e4520c8bSEnji Cooper * Add gcc 4.2 support. 1519e4520c8bSEnji Cooper * Add support for AES and SSE2 assembly language optimization 1520e4520c8bSEnji Cooper for VC++ build. 1521e4520c8bSEnji Cooper * Support for RFC4507bis and server name extensions if explicitly 1522e4520c8bSEnji Cooper selected at compile time. 1523e4520c8bSEnji Cooper * DTLS improvements. 1524e4520c8bSEnji Cooper * RFC4507bis support. 1525e4520c8bSEnji Cooper * TLS Extensions support. 1526e4520c8bSEnji Cooper 1527e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8d and OpenSSL 0.9.8e [23 Feb 2007] 1528e4520c8bSEnji Cooper 1529e4520c8bSEnji Cooper * Various ciphersuite selection fixes. 1530e4520c8bSEnji Cooper * RFC3779 support. 1531e4520c8bSEnji Cooper 1532e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8c and OpenSSL 0.9.8d [28 Sep 2006] 1533e4520c8bSEnji Cooper 1534e4520c8bSEnji Cooper * Introduce limits to prevent malicious key DoS ([CVE-2006-2940]) 1535e4520c8bSEnji Cooper * Fix security issues [CVE-2006-2937], [CVE-2006-3737], [CVE-2006-4343] 1536e4520c8bSEnji Cooper * Changes to ciphersuite selection algorithm 1537e4520c8bSEnji Cooper 1538e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8b and OpenSSL 0.9.8c [5 Sep 2006] 1539e4520c8bSEnji Cooper 1540e4520c8bSEnji Cooper * Fix Daniel Bleichenbacher forged signature attack, [CVE-2006-4339] 1541e4520c8bSEnji Cooper * New cipher Camellia 1542e4520c8bSEnji Cooper 1543e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8a and OpenSSL 0.9.8b [4 May 2006] 1544e4520c8bSEnji Cooper 1545e4520c8bSEnji Cooper * Cipher string fixes. 1546e4520c8bSEnji Cooper * Fixes for VC++ 2005. 1547e4520c8bSEnji Cooper * Updated ECC cipher suite support. 1548e4520c8bSEnji Cooper * New functions EVP_CIPHER_CTX_new() and EVP_CIPHER_CTX_free(). 1549e4520c8bSEnji Cooper * Zlib compression usage fixes. 1550e4520c8bSEnji Cooper * Built in dynamic engine compilation support on Win32. 1551e4520c8bSEnji Cooper * Fixes auto dynamic engine loading in Win32. 1552e4520c8bSEnji Cooper 1553e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.8 and OpenSSL 0.9.8a [11 Oct 2005] 1554e4520c8bSEnji Cooper 1555e4520c8bSEnji Cooper * Fix potential SSL 2.0 rollback ([CVE-2005-2969]) 1556e4520c8bSEnji Cooper * Extended Windows CE support 1557e4520c8bSEnji Cooper 1558e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.8 [5 Jul 2005] 1559e4520c8bSEnji Cooper 1560e4520c8bSEnji Cooper * Major work on the BIGNUM library for higher efficiency and to 1561e4520c8bSEnji Cooper make operations more streamlined and less contradictory. This 1562e4520c8bSEnji Cooper is the result of a major audit of the BIGNUM library. 1563e4520c8bSEnji Cooper * Addition of BIGNUM functions for fields GF(2^m) and NIST 1564e4520c8bSEnji Cooper curves, to support the Elliptic Crypto functions. 1565e4520c8bSEnji Cooper * Major work on Elliptic Crypto; ECDH and ECDSA added, including 1566e4520c8bSEnji Cooper the use through EVP, X509 and ENGINE. 1567e4520c8bSEnji Cooper * New ASN.1 mini-compiler that's usable through the OpenSSL 1568e4520c8bSEnji Cooper configuration file. 1569e4520c8bSEnji Cooper * Added support for ASN.1 indefinite length constructed encoding. 1570e4520c8bSEnji Cooper * New PKCS#12 'medium level' API to manipulate PKCS#12 files. 1571e4520c8bSEnji Cooper * Complete rework of shared library construction and linking 1572e4520c8bSEnji Cooper programs with shared or static libraries, through a separate 1573e4520c8bSEnji Cooper Makefile.shared. 1574e4520c8bSEnji Cooper * Rework of the passing of parameters from one Makefile to another. 1575e4520c8bSEnji Cooper * Changed ENGINE framework to load dynamic engine modules 1576e4520c8bSEnji Cooper automatically from specifically given directories. 1577e4520c8bSEnji Cooper * New structure and ASN.1 functions for CertificatePair. 1578e4520c8bSEnji Cooper * Changed the ZLIB compression method to be stateful. 1579e4520c8bSEnji Cooper * Changed the key-generation and primality testing "progress" 1580e4520c8bSEnji Cooper mechanism to take a structure that contains the ticker 1581e4520c8bSEnji Cooper function and an argument. 1582e4520c8bSEnji Cooper * New engine module: GMP (performs private key exponentiation). 1583e4520c8bSEnji Cooper * New engine module: VIA PadLOck ACE extension in VIA C3 1584e4520c8bSEnji Cooper Nehemiah processors. 1585e4520c8bSEnji Cooper * Added support for IPv6 addresses in certificate extensions. 1586e4520c8bSEnji Cooper See RFC 1884, section 2.2. 1587e4520c8bSEnji Cooper * Added support for certificate policy mappings, policy 1588e4520c8bSEnji Cooper constraints and name constraints. 1589e4520c8bSEnji Cooper * Added support for multi-valued AVAs in the OpenSSL 1590e4520c8bSEnji Cooper configuration file. 1591e4520c8bSEnji Cooper * Added support for multiple certificates with the same subject 1592e4520c8bSEnji Cooper in the 'openssl ca' index file. 1593e4520c8bSEnji Cooper * Make it possible to create self-signed certificates using 1594e4520c8bSEnji Cooper 'openssl ca -selfsign'. 1595e4520c8bSEnji Cooper * Make it possible to generate a serial number file with 1596e4520c8bSEnji Cooper 'openssl ca -create_serial'. 1597e4520c8bSEnji Cooper * New binary search functions with extended functionality. 1598e4520c8bSEnji Cooper * New BUF functions. 1599e4520c8bSEnji Cooper * New STORE structure and library to provide an interface to all 1600e4520c8bSEnji Cooper sorts of data repositories. Supports storage of public and 1601e4520c8bSEnji Cooper private keys, certificates, CRLs, numbers and arbitrary blobs. 1602e4520c8bSEnji Cooper This library is unfortunately unfinished and unused within 1603e4520c8bSEnji Cooper OpenSSL. 1604e4520c8bSEnji Cooper * New control functions for the error stack. 1605e4520c8bSEnji Cooper * Changed the PKCS#7 library to support one-pass S/MIME 1606e4520c8bSEnji Cooper processing. 1607e4520c8bSEnji Cooper * Added the possibility to compile without old deprecated 1608e4520c8bSEnji Cooper functionality with the OPENSSL_NO_DEPRECATED macro or the 1609e4520c8bSEnji Cooper 'no-deprecated' argument to the config and Configure scripts. 1610e4520c8bSEnji Cooper * Constification of all ASN.1 conversion functions, and other 1611e4520c8bSEnji Cooper affected functions. 1612e4520c8bSEnji Cooper * Improved platform support for PowerPC. 1613e4520c8bSEnji Cooper * New FIPS 180-2 algorithms (SHA-224, -256, -384 and -512). 1614e4520c8bSEnji Cooper * New X509_VERIFY_PARAM structure to support parameterisation 1615e4520c8bSEnji Cooper of X.509 path validation. 1616e4520c8bSEnji Cooper * Major overhaul of RC4 performance on Intel P4, IA-64 and 1617e4520c8bSEnji Cooper AMD64. 1618e4520c8bSEnji Cooper * Changed the Configure script to have some algorithms disabled 1619e4520c8bSEnji Cooper by default. Those can be explicitly enabled with the new 1620e4520c8bSEnji Cooper argument form 'enable-xxx'. 1621e4520c8bSEnji Cooper * Change the default digest in 'openssl' commands from MD5 to 1622e4520c8bSEnji Cooper SHA-1. 1623e4520c8bSEnji Cooper * Added support for DTLS. 1624e4520c8bSEnji Cooper * New BIGNUM blinding. 1625e4520c8bSEnji Cooper * Added support for the RSA-PSS encryption scheme 1626e4520c8bSEnji Cooper * Added support for the RSA X.931 padding. 1627e4520c8bSEnji Cooper * Added support for BSD sockets on NetWare. 1628e4520c8bSEnji Cooper * Added support for files larger than 2GB. 1629e4520c8bSEnji Cooper * Added initial support for Win64. 1630e4520c8bSEnji Cooper * Added alternate pkg-config files. 1631e4520c8bSEnji Cooper 1632e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7l and OpenSSL 0.9.7m [23 Feb 2007] 1633e4520c8bSEnji Cooper 1634e4520c8bSEnji Cooper * FIPS 1.1.1 module linking. 1635e4520c8bSEnji Cooper * Various ciphersuite selection fixes. 1636e4520c8bSEnji Cooper 1637e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7k and OpenSSL 0.9.7l [28 Sep 2006] 1638e4520c8bSEnji Cooper 1639e4520c8bSEnji Cooper * Introduce limits to prevent malicious key DoS ([CVE-2006-2940]) 1640e4520c8bSEnji Cooper * Fix security issues [CVE-2006-2937], [CVE-2006-3737], [CVE-2006-4343] 1641e4520c8bSEnji Cooper 1642e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7j and OpenSSL 0.9.7k [5 Sep 2006] 1643e4520c8bSEnji Cooper 1644e4520c8bSEnji Cooper * Fix Daniel Bleichenbacher forged signature attack, [CVE-2006-4339] 1645e4520c8bSEnji Cooper 1646e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7i and OpenSSL 0.9.7j [4 May 2006] 1647e4520c8bSEnji Cooper 1648e4520c8bSEnji Cooper * Visual C++ 2005 fixes. 1649e4520c8bSEnji Cooper * Update Windows build system for FIPS. 1650e4520c8bSEnji Cooper 1651e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7h and OpenSSL 0.9.7i [14 Oct 2005] 1652e4520c8bSEnji Cooper 1653e4520c8bSEnji Cooper * Give EVP_MAX_MD_SIZE its old value, except for a FIPS build. 1654e4520c8bSEnji Cooper 1655e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.7h [11 Oct 2005] 1656e4520c8bSEnji Cooper 1657e4520c8bSEnji Cooper * Fix SSL 2.0 Rollback ([CVE-2005-2969]) 1658e4520c8bSEnji Cooper * Allow use of fixed-length exponent on DSA signing 1659e4520c8bSEnji Cooper * Default fixed-window RSA, DSA, DH private-key operations 1660e4520c8bSEnji Cooper 1661e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7f and OpenSSL 0.9.7g [11 Apr 2005] 1662e4520c8bSEnji Cooper 1663e4520c8bSEnji Cooper * More compilation issues fixed. 1664e4520c8bSEnji Cooper * Adaptation to more modern Kerberos API. 1665e4520c8bSEnji Cooper * Enhanced or corrected configuration for Solaris64, Mingw and Cygwin. 1666e4520c8bSEnji Cooper * Enhanced x86_64 assembler BIGNUM module. 1667e4520c8bSEnji Cooper * More constification. 1668e4520c8bSEnji Cooper * Added processing of proxy certificates (RFC 3820). 1669e4520c8bSEnji Cooper 1670e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7e and OpenSSL 0.9.7f [22 Mar 2005] 1671e4520c8bSEnji Cooper 1672e4520c8bSEnji Cooper * Several compilation issues fixed. 1673e4520c8bSEnji Cooper * Many memory allocation failure checks added. 1674e4520c8bSEnji Cooper * Improved comparison of X509 Name type. 1675e4520c8bSEnji Cooper * Mandatory basic checks on certificates. 1676e4520c8bSEnji Cooper * Performance improvements. 1677e4520c8bSEnji Cooper 1678e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7d and OpenSSL 0.9.7e [25 Oct 2004] 1679e4520c8bSEnji Cooper 1680e4520c8bSEnji Cooper * Fix race condition in CRL checking code. 1681e4520c8bSEnji Cooper * Fixes to PKCS#7 (S/MIME) code. 1682e4520c8bSEnji Cooper 1683e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7c and OpenSSL 0.9.7d [17 Mar 2004] 1684e4520c8bSEnji Cooper 1685e4520c8bSEnji Cooper * Security: Fix Kerberos ciphersuite SSL/TLS handshaking bug 1686e4520c8bSEnji Cooper * Security: Fix null-pointer assignment in do_change_cipher_spec() 1687e4520c8bSEnji Cooper * Allow multiple active certificates with same subject in CA index 1688e4520c8bSEnji Cooper * Multiple X509 verification fixes 1689e4520c8bSEnji Cooper * Speed up HMAC and other operations 1690e4520c8bSEnji Cooper 1691e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7b and OpenSSL 0.9.7c [30 Sep 2003] 1692e4520c8bSEnji Cooper 1693e4520c8bSEnji Cooper * Security: fix various ASN1 parsing bugs. 1694e4520c8bSEnji Cooper * New -ignore_err option to OCSP utility. 1695e4520c8bSEnji Cooper * Various interop and bug fixes in S/MIME code. 1696e4520c8bSEnji Cooper * SSL/TLS protocol fix for unrequested client certificates. 1697e4520c8bSEnji Cooper 1698e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7a and OpenSSL 0.9.7b [10 Apr 2003] 1699e4520c8bSEnji Cooper 1700e4520c8bSEnji Cooper * Security: counter the Klima-Pokorny-Rosa extension of 1701e4520c8bSEnji Cooper Bleichbacher's attack 1702e4520c8bSEnji Cooper * Security: make RSA blinding default. 1703e4520c8bSEnji Cooper * Configuration: Irix fixes, AIX fixes, better mingw support. 1704e4520c8bSEnji Cooper * Support for new platforms: linux-ia64-ecc. 1705e4520c8bSEnji Cooper * Build: shared library support fixes. 1706e4520c8bSEnji Cooper * ASN.1: treat domainComponent correctly. 1707e4520c8bSEnji Cooper * Documentation: fixes and additions. 1708e4520c8bSEnji Cooper 1709e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.7 and OpenSSL 0.9.7a [19 Feb 2003] 1710e4520c8bSEnji Cooper 1711e4520c8bSEnji Cooper * Security: Important security related bugfixes. 1712e4520c8bSEnji Cooper * Enhanced compatibility with MIT Kerberos. 1713e4520c8bSEnji Cooper * Can be built without the ENGINE framework. 1714e4520c8bSEnji Cooper * IA32 assembler enhancements. 1715e4520c8bSEnji Cooper * Support for new platforms: FreeBSD/IA64 and FreeBSD/Sparc64. 1716e4520c8bSEnji Cooper * Configuration: the no-err option now works properly. 1717e4520c8bSEnji Cooper * SSL/TLS: now handles manual certificate chain building. 1718e4520c8bSEnji Cooper * SSL/TLS: certain session ID malfunctions corrected. 1719e4520c8bSEnji Cooper 1720e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.7 [30 Dec 2002] 1721e4520c8bSEnji Cooper 1722e4520c8bSEnji Cooper * New library section OCSP. 1723e4520c8bSEnji Cooper * Complete rewrite of ASN1 code. 1724e4520c8bSEnji Cooper * CRL checking in verify code and openssl utility. 1725e4520c8bSEnji Cooper * Extension copying in 'ca' utility. 1726e4520c8bSEnji Cooper * Flexible display options in 'ca' utility. 1727e4520c8bSEnji Cooper * Provisional support for international characters with UTF8. 1728e4520c8bSEnji Cooper * Support for external crypto devices ('engine') is no longer 1729e4520c8bSEnji Cooper a separate distribution. 1730e4520c8bSEnji Cooper * New elliptic curve library section. 1731e4520c8bSEnji Cooper * New AES (Rijndael) library section. 1732e4520c8bSEnji Cooper * Support for new platforms: Windows CE, Tandem OSS, A/UX, AIX 64-bit, 1733e4520c8bSEnji Cooper Linux x86_64, Linux 64-bit on Sparc v9 1734e4520c8bSEnji Cooper * Extended support for some platforms: VxWorks 1735e4520c8bSEnji Cooper * Enhanced support for shared libraries. 1736e4520c8bSEnji Cooper * Now only builds PIC code when shared library support is requested. 1737e4520c8bSEnji Cooper * Support for pkg-config. 1738e4520c8bSEnji Cooper * Lots of new manuals. 1739e4520c8bSEnji Cooper * Makes symbolic links to or copies of manuals to cover all described 1740e4520c8bSEnji Cooper functions. 1741e4520c8bSEnji Cooper * Change DES API to clean up the namespace (some applications link also 1742e4520c8bSEnji Cooper against libdes providing similar functions having the same name). 1743e4520c8bSEnji Cooper Provide macros for backward compatibility (will be removed in the 1744e4520c8bSEnji Cooper future). 1745e4520c8bSEnji Cooper * Unify handling of cryptographic algorithms (software and engine) 1746e4520c8bSEnji Cooper to be available via EVP routines for asymmetric and symmetric ciphers. 1747e4520c8bSEnji Cooper * NCONF: new configuration handling routines. 1748e4520c8bSEnji Cooper * Change API to use more 'const' modifiers to improve error checking 1749e4520c8bSEnji Cooper and help optimizers. 1750e4520c8bSEnji Cooper * Finally remove references to RSAref. 1751e4520c8bSEnji Cooper * Reworked parts of the BIGNUM code. 1752e4520c8bSEnji Cooper * Support for new engines: Broadcom ubsec, Accelerated Encryption 1753e4520c8bSEnji Cooper Processing, IBM 4758. 1754e4520c8bSEnji Cooper * A few new engines added in the demos area. 1755e4520c8bSEnji Cooper * Extended and corrected OID (object identifier) table. 1756e4520c8bSEnji Cooper * PRNG: query at more locations for a random device, automatic query for 1757e4520c8bSEnji Cooper EGD style random sources at several locations. 1758e4520c8bSEnji Cooper * SSL/TLS: allow optional cipher choice according to server's preference. 1759e4520c8bSEnji Cooper * SSL/TLS: allow server to explicitly set new session ids. 1760e4520c8bSEnji Cooper * SSL/TLS: support Kerberos cipher suites (RFC2712). 1761e4520c8bSEnji Cooper Only supports MIT Kerberos for now. 1762e4520c8bSEnji Cooper * SSL/TLS: allow more precise control of renegotiations and sessions. 1763e4520c8bSEnji Cooper * SSL/TLS: add callback to retrieve SSL/TLS messages. 1764e4520c8bSEnji Cooper * SSL/TLS: support AES cipher suites (RFC3268). 1765e4520c8bSEnji Cooper 1766e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6j and OpenSSL 0.9.6k [30 Sep 2003] 1767e4520c8bSEnji Cooper 1768e4520c8bSEnji Cooper * Security: fix various ASN1 parsing bugs. 1769e4520c8bSEnji Cooper * SSL/TLS protocol fix for unrequested client certificates. 1770e4520c8bSEnji Cooper 1771e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6i and OpenSSL 0.9.6j [10 Apr 2003] 1772e4520c8bSEnji Cooper 1773e4520c8bSEnji Cooper * Security: counter the Klima-Pokorny-Rosa extension of 1774e4520c8bSEnji Cooper Bleichbacher's attack 1775e4520c8bSEnji Cooper * Security: make RSA blinding default. 1776e4520c8bSEnji Cooper * Build: shared library support fixes. 1777e4520c8bSEnji Cooper 1778e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6h and OpenSSL 0.9.6i [19 Feb 2003] 1779e4520c8bSEnji Cooper 1780e4520c8bSEnji Cooper * Important security related bugfixes. 1781e4520c8bSEnji Cooper 1782e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6g and OpenSSL 0.9.6h [5 Dec 2002] 1783e4520c8bSEnji Cooper 1784e4520c8bSEnji Cooper * New configuration targets for Tandem OSS and A/UX. 1785e4520c8bSEnji Cooper * New OIDs for Microsoft attributes. 1786e4520c8bSEnji Cooper * Better handling of SSL session caching. 1787e4520c8bSEnji Cooper * Better comparison of distinguished names. 1788e4520c8bSEnji Cooper * Better handling of shared libraries in a mixed GNU/non-GNU environment. 1789e4520c8bSEnji Cooper * Support assembler code with Borland C. 1790e4520c8bSEnji Cooper * Fixes for length problems. 1791e4520c8bSEnji Cooper * Fixes for uninitialised variables. 1792e4520c8bSEnji Cooper * Fixes for memory leaks, some unusual crashes and some race conditions. 1793e4520c8bSEnji Cooper * Fixes for smaller building problems. 1794e4520c8bSEnji Cooper * Updates of manuals, FAQ and other instructive documents. 1795e4520c8bSEnji Cooper 1796e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6f and OpenSSL 0.9.6g [9 Aug 2002] 1797e4520c8bSEnji Cooper 1798e4520c8bSEnji Cooper * Important building fixes on Unix. 1799e4520c8bSEnji Cooper 1800e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6e and OpenSSL 0.9.6f [8 Aug 2002] 1801e4520c8bSEnji Cooper 1802e4520c8bSEnji Cooper * Various important bugfixes. 1803e4520c8bSEnji Cooper 1804e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6d and OpenSSL 0.9.6e [30 Jul 2002] 1805e4520c8bSEnji Cooper 1806e4520c8bSEnji Cooper * Important security related bugfixes. 1807e4520c8bSEnji Cooper * Various SSL/TLS library bugfixes. 1808e4520c8bSEnji Cooper 1809e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6c and OpenSSL 0.9.6d [9 May 2002] 1810e4520c8bSEnji Cooper 1811e4520c8bSEnji Cooper * Various SSL/TLS library bugfixes. 1812e4520c8bSEnji Cooper * Fix DH parameter generation for 'non-standard' generators. 1813e4520c8bSEnji Cooper 1814e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6b and OpenSSL 0.9.6c [21 Dec 2001] 1815e4520c8bSEnji Cooper 1816e4520c8bSEnji Cooper * Various SSL/TLS library bugfixes. 1817e4520c8bSEnji Cooper * BIGNUM library fixes. 1818e4520c8bSEnji Cooper * RSA OAEP and random number generation fixes. 1819e4520c8bSEnji Cooper * Object identifiers corrected and added. 1820e4520c8bSEnji Cooper * Add assembler BN routines for IA64. 1821e4520c8bSEnji Cooper * Add support for OS/390 Unix, UnixWare with gcc, OpenUNIX 8, 1822e4520c8bSEnji Cooper MIPS Linux; shared library support for Irix, HP-UX. 1823e4520c8bSEnji Cooper * Add crypto accelerator support for AEP, Baltimore SureWare, 1824e4520c8bSEnji Cooper Broadcom and Cryptographic Appliance's keyserver 1825e4520c8bSEnji Cooper [in 0.9.6c-engine release]. 1826e4520c8bSEnji Cooper 1827e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6a and OpenSSL 0.9.6b [9 Jul 2001] 1828e4520c8bSEnji Cooper 1829e4520c8bSEnji Cooper * Security fix: PRNG improvements. 1830e4520c8bSEnji Cooper * Security fix: RSA OAEP check. 1831e4520c8bSEnji Cooper * Security fix: Reinsert and fix countermeasure to Bleichbacher's 1832e4520c8bSEnji Cooper attack. 1833e4520c8bSEnji Cooper * MIPS bug fix in BIGNUM. 1834e4520c8bSEnji Cooper * Bug fix in "openssl enc". 1835e4520c8bSEnji Cooper * Bug fix in X.509 printing routine. 1836e4520c8bSEnji Cooper * Bug fix in DSA verification routine and DSA S/MIME verification. 1837e4520c8bSEnji Cooper * Bug fix to make PRNG thread-safe. 1838e4520c8bSEnji Cooper * Bug fix in RAND_file_name(). 1839e4520c8bSEnji Cooper * Bug fix in compatibility mode trust settings. 1840e4520c8bSEnji Cooper * Bug fix in blowfish EVP. 1841e4520c8bSEnji Cooper * Increase default size for BIO buffering filter. 1842e4520c8bSEnji Cooper * Compatibility fixes in some scripts. 1843e4520c8bSEnji Cooper 1844e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.6a [5 Apr 2001] 1845e4520c8bSEnji Cooper 1846e4520c8bSEnji Cooper * Security fix: change behavior of OpenSSL to avoid using 1847e4520c8bSEnji Cooper environment variables when running as root. 1848e4520c8bSEnji Cooper * Security fix: check the result of RSA-CRT to reduce the 1849e4520c8bSEnji Cooper possibility of deducing the private key from an incorrectly 1850e4520c8bSEnji Cooper calculated signature. 1851e4520c8bSEnji Cooper * Security fix: prevent Bleichenbacher's DSA attack. 1852e4520c8bSEnji Cooper * Security fix: Zero the premaster secret after deriving the 1853e4520c8bSEnji Cooper master secret in DH ciphersuites. 1854e4520c8bSEnji Cooper * Reimplement SSL_peek(), which had various problems. 1855e4520c8bSEnji Cooper * Compatibility fix: the function des_encrypt() renamed to 1856e4520c8bSEnji Cooper des_encrypt1() to avoid clashes with some Unixen libc. 1857e4520c8bSEnji Cooper * Bug fixes for Win32, HP/UX and Irix. 1858e4520c8bSEnji Cooper * Bug fixes in BIGNUM, SSL, PKCS#7, PKCS#12, X.509, CONF and 1859e4520c8bSEnji Cooper memory checking routines. 1860e4520c8bSEnji Cooper * Bug fixes for RSA operations in threaded environments. 1861e4520c8bSEnji Cooper * Bug fixes in misc. openssl applications. 1862e4520c8bSEnji Cooper * Remove a few potential memory leaks. 1863e4520c8bSEnji Cooper * Add tighter checks of BIGNUM routines. 1864e4520c8bSEnji Cooper * Shared library support has been reworked for generality. 1865e4520c8bSEnji Cooper * More documentation. 1866e4520c8bSEnji Cooper * New function BN_rand_range(). 1867e4520c8bSEnji Cooper * Add "-rand" option to openssl s_client and s_server. 1868e4520c8bSEnji Cooper 1869e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.5a and OpenSSL 0.9.6 [10 Oct 2000] 1870e4520c8bSEnji Cooper 1871e4520c8bSEnji Cooper * Some documentation for BIO and SSL libraries. 1872e4520c8bSEnji Cooper * Enhanced chain verification using key identifiers. 1873e4520c8bSEnji Cooper * New sign and verify options to 'dgst' application. 1874e4520c8bSEnji Cooper * Support for DER and PEM encoded messages in 'smime' application. 1875e4520c8bSEnji Cooper * New 'rsautl' application, low-level RSA utility. 1876e4520c8bSEnji Cooper * MD4 now included. 1877e4520c8bSEnji Cooper * Bugfix for SSL rollback padding check. 1878e4520c8bSEnji Cooper * Support for external crypto devices [1]. 1879e4520c8bSEnji Cooper * Enhanced EVP interface. 1880e4520c8bSEnji Cooper 1881e4520c8bSEnji Cooper [1] The support for external crypto devices is currently a separate 1882e4520c8bSEnji Cooper distribution. See the file README-Engine.md. 1883e4520c8bSEnji Cooper 1884e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.5 and OpenSSL 0.9.5a [1 Apr 2000] 1885e4520c8bSEnji Cooper 1886e4520c8bSEnji Cooper * Bug fixes for Win32, SuSE Linux, NeXTSTEP and FreeBSD 2.2.8 1887e4520c8bSEnji Cooper * Shared library support for HPUX and Solaris-gcc 1888e4520c8bSEnji Cooper * Support of Linux/IA64 1889e4520c8bSEnji Cooper * Assembler support for Mingw32 1890e4520c8bSEnji Cooper * New 'rand' application 1891e4520c8bSEnji Cooper * New way to check for existence of algorithms from scripts 1892e4520c8bSEnji Cooper 1893e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.4 and OpenSSL 0.9.5 [25 May 2000] 1894e4520c8bSEnji Cooper 1895e4520c8bSEnji Cooper * S/MIME support in new 'smime' command 1896e4520c8bSEnji Cooper * Documentation for the OpenSSL command line application 1897e4520c8bSEnji Cooper * Automation of 'req' application 1898e4520c8bSEnji Cooper * Fixes to make s_client, s_server work under Windows 1899e4520c8bSEnji Cooper * Support for multiple fieldnames in SPKACs 1900e4520c8bSEnji Cooper * New SPKAC command line utility and associated library functions 1901e4520c8bSEnji Cooper * Options to allow passwords to be obtained from various sources 1902e4520c8bSEnji Cooper * New public key PEM format and options to handle it 1903e4520c8bSEnji Cooper * Many other fixes and enhancements to command line utilities 1904e4520c8bSEnji Cooper * Usable certificate chain verification 1905e4520c8bSEnji Cooper * Certificate purpose checking 1906e4520c8bSEnji Cooper * Certificate trust settings 1907e4520c8bSEnji Cooper * Support of authority information access extension 1908e4520c8bSEnji Cooper * Extensions in certificate requests 1909e4520c8bSEnji Cooper * Simplified X509 name and attribute routines 1910e4520c8bSEnji Cooper * Initial (incomplete) support for international character sets 1911e4520c8bSEnji Cooper * New DH_METHOD, DSA_METHOD and enhanced RSA_METHOD 1912e4520c8bSEnji Cooper * Read only memory BIOs and simplified creation function 1913e4520c8bSEnji Cooper * TLS/SSL protocol bugfixes: Accept TLS 'client hello' in SSL 3.0 1914e4520c8bSEnji Cooper record; allow fragmentation and interleaving of handshake and other 1915e4520c8bSEnji Cooper data 1916e4520c8bSEnji Cooper * TLS/SSL code now "tolerates" MS SGC 1917e4520c8bSEnji Cooper * Work around for Netscape client certificate hang bug 1918e4520c8bSEnji Cooper * RSA_NULL option that removes RSA patent code but keeps other 1919e4520c8bSEnji Cooper RSA functionality 1920e4520c8bSEnji Cooper * Memory leak detection now allows applications to add extra information 1921e4520c8bSEnji Cooper via a per-thread stack 1922e4520c8bSEnji Cooper * PRNG robustness improved 1923e4520c8bSEnji Cooper * EGD support 1924e4520c8bSEnji Cooper * BIGNUM library bug fixes 1925e4520c8bSEnji Cooper * Faster DSA parameter generation 1926e4520c8bSEnji Cooper * Enhanced support for Alpha Linux 1927e4520c8bSEnji Cooper * Experimental macOS support 1928e4520c8bSEnji Cooper 1929e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.3 and OpenSSL 0.9.4 [9 Aug 1999] 1930e4520c8bSEnji Cooper 1931e4520c8bSEnji Cooper * Transparent support for PKCS#8 format private keys: these are used 1932e4520c8bSEnji Cooper by several software packages and are more secure than the standard 1933e4520c8bSEnji Cooper form 1934e4520c8bSEnji Cooper * PKCS#5 v2.0 implementation 1935e4520c8bSEnji Cooper * Password callbacks have a new void * argument for application data 1936e4520c8bSEnji Cooper * Avoid various memory leaks 1937e4520c8bSEnji Cooper * New pipe-like BIO that allows using the SSL library when actual I/O 1938e4520c8bSEnji Cooper must be handled by the application (BIO pair) 1939e4520c8bSEnji Cooper 1940e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.2b and OpenSSL 0.9.3 [24 May 1999] 1941e4520c8bSEnji Cooper 1942e4520c8bSEnji Cooper * Lots of enhancements and cleanups to the Configuration mechanism 1943e4520c8bSEnji Cooper * RSA OEAP related fixes 1944e4520c8bSEnji Cooper * Added "openssl ca -revoke" option for revoking a certificate 1945e4520c8bSEnji Cooper * Source cleanups: const correctness, type-safe stacks and ASN.1 SETs 1946e4520c8bSEnji Cooper * Source tree cleanups: removed lots of obsolete files 1947e4520c8bSEnji Cooper * Thawte SXNet, certificate policies and CRL distribution points 1948e4520c8bSEnji Cooper extension support 1949e4520c8bSEnji Cooper * Preliminary (experimental) S/MIME support 1950e4520c8bSEnji Cooper * Support for ASN.1 UTF8String and VisibleString 1951e4520c8bSEnji Cooper * Full integration of PKCS#12 code 1952e4520c8bSEnji Cooper * Sparc assembler bignum implementation, optimized hash functions 1953e4520c8bSEnji Cooper * Option to disable selected ciphers 1954e4520c8bSEnji Cooper 1955e4520c8bSEnji Cooper### Major changes between OpenSSL 0.9.1c and OpenSSL 0.9.2b [22 Mar 1999] 1956e4520c8bSEnji Cooper 1957e4520c8bSEnji Cooper * Fixed a security hole related to session resumption 1958e4520c8bSEnji Cooper * Fixed RSA encryption routines for the p < q case 1959e4520c8bSEnji Cooper * "ALL" in cipher lists now means "everything except NULL ciphers" 1960e4520c8bSEnji Cooper * Support for Triple-DES CBCM cipher 1961e4520c8bSEnji Cooper * Support of Optimal Asymmetric Encryption Padding (OAEP) for RSA 1962e4520c8bSEnji Cooper * First support for new TLSv1 ciphers 1963e4520c8bSEnji Cooper * Added a few new BIOs (syslog BIO, reliable BIO) 1964e4520c8bSEnji Cooper * Extended support for DSA certificate/keys. 1965e4520c8bSEnji Cooper * Extended support for Certificate Signing Requests (CSR) 1966e4520c8bSEnji Cooper * Initial support for X.509v3 extensions 1967e4520c8bSEnji Cooper * Extended support for compression inside the SSL record layer 1968e4520c8bSEnji Cooper * Overhauled Win32 builds 1969e4520c8bSEnji Cooper * Cleanups and fixes to the Big Number (BN) library 1970e4520c8bSEnji Cooper * Support for ASN.1 GeneralizedTime 197129536654SEnji Cooper * Split ASN.1 SETs from SEQUENCEs 1972e4520c8bSEnji Cooper * ASN1 and PEM support for Netscape Certificate Sequences 1973e4520c8bSEnji Cooper * Overhauled Perl interface 1974e4520c8bSEnji Cooper * Lots of source tree cleanups. 1975e4520c8bSEnji Cooper * Lots of memory leak fixes. 1976e4520c8bSEnji Cooper * Lots of bug fixes. 1977e4520c8bSEnji Cooper 1978e4520c8bSEnji Cooper### Major changes between SSLeay 0.9.0b and OpenSSL 0.9.1c [23 Dec 1998] 1979e4520c8bSEnji Cooper 1980e4520c8bSEnji Cooper * Integration of the popular NO_RSA/NO_DSA patches 1981e4520c8bSEnji Cooper * Initial support for compression inside the SSL record layer 1982e4520c8bSEnji Cooper * Added BIO proxy and filtering functionality 1983e4520c8bSEnji Cooper * Extended Big Number (BN) library 1984e4520c8bSEnji Cooper * Added RIPE MD160 message digest 1985e4520c8bSEnji Cooper * Added support for RC2/64bit cipher 1986e4520c8bSEnji Cooper * Extended ASN.1 parser routines 1987e4520c8bSEnji Cooper * Adjustments of the source tree for CVS 1988e4520c8bSEnji Cooper * Support for various new platforms 1989e4520c8bSEnji Cooper 1990e4520c8bSEnji Cooper<!-- Links --> 1991808413daSEnji Cooper[CVE-2026-22796]: https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22796 1992808413daSEnji Cooper[CVE-2026-22795]: https://www.openssl.org/news/vulnerabilities.html#CVE-2026-22795 1993808413daSEnji Cooper[CVE-2025-69421]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69421 1994808413daSEnji Cooper[CVE-2025-69420]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69420 1995808413daSEnji Cooper[CVE-2025-69419]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69419 1996808413daSEnji Cooper[CVE-2025-69418]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-69418 1997808413daSEnji Cooper[CVE-2025-68160]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-68160 1998808413daSEnji Cooper[CVE-2025-66199]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-66199 1999808413daSEnji Cooper[CVE-2025-15469]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15469 2000808413daSEnji Cooper[CVE-2025-15468]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15468 2001808413daSEnji Cooper[CVE-2025-15467]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-15467 2002808413daSEnji Cooper[CVE-2025-11187]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-11187 20038e12a5c4SEnji Cooper[CVE-2025-9232]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-9232 20048e12a5c4SEnji Cooper[CVE-2025-9231]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-9231 20058e12a5c4SEnji Cooper[CVE-2025-9230]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-9230 20061095efe4SPierre Pronchery[CVE-2025-4575]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-4575 20071c342803SEnji Cooper[CVE-2024-13176]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-13176 20081c342803SEnji Cooper[CVE-2024-9143]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-9143 2009108164cfSGordon Tetlow[CVE-2024-6119]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-6119 2010108164cfSGordon Tetlow[CVE-2024-5535]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-5535 20111070e7dcSEnji Cooper[CVE-2024-4741]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4741 20121070e7dcSEnji Cooper[CVE-2024-4603]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4603 20131070e7dcSEnji Cooper[CVE-2024-2511]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-2511 20149dd13e84SCy Schubert[CVE-2024-0727]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-0727 20159dd13e84SCy Schubert[CVE-2023-6237]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-6237 20169dd13e84SCy Schubert[CVE-2023-6129]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-6129 20179dd13e84SCy Schubert[CVE-2023-5678]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-5678 2018825caf7eSEd Maste[CVE-2023-5363]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-5363 2019315108b8SPierre Pronchery[CVE-2023-4807]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-4807 2020cf2fc1b0SPierre Pronchery[CVE-2023-3817]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3817 2021cf2fc1b0SPierre Pronchery[CVE-2023-3446]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446 2022cf2fc1b0SPierre Pronchery[CVE-2023-2975]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975 2023b84c4564SPierre Pronchery[CVE-2023-2650]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650 2024b84c4564SPierre Pronchery[CVE-2023-1255]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255 2025b84c4564SPierre Pronchery[CVE-2023-0466]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0466 2026b84c4564SPierre Pronchery[CVE-2023-0465]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0465 2027b84c4564SPierre Pronchery[CVE-2023-0464]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0464 2028e4520c8bSEnji Cooper[CVE-2023-0401]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0401 2029e4520c8bSEnji Cooper[CVE-2023-0286]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0286 2030e4520c8bSEnji Cooper[CVE-2023-0217]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0217 2031e4520c8bSEnji Cooper[CVE-2023-0216]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0216 2032e4520c8bSEnji Cooper[CVE-2023-0215]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0215 2033e4520c8bSEnji Cooper[CVE-2022-4450]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-4450 2034e4520c8bSEnji Cooper[CVE-2022-4304]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-4304 2035e4520c8bSEnji Cooper[CVE-2022-4203]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-4203 2036e4520c8bSEnji Cooper[CVE-2022-3996]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-3996 2037e4520c8bSEnji Cooper[CVE-2022-2274]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-2274 2038b84c4564SPierre Pronchery[CVE-2022-2097]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-2097 2039e4520c8bSEnji Cooper[CVE-2020-1971]: https://www.openssl.org/news/vulnerabilities.html#CVE-2020-1971 2040e4520c8bSEnji Cooper[CVE-2020-1967]: https://www.openssl.org/news/vulnerabilities.html#CVE-2020-1967 2041e4520c8bSEnji Cooper[CVE-2019-1563]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1563 2042e4520c8bSEnji Cooper[CVE-2019-1559]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1559 2043e4520c8bSEnji Cooper[CVE-2019-1552]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1552 2044e4520c8bSEnji Cooper[CVE-2019-1551]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1551 2045e4520c8bSEnji Cooper[CVE-2019-1549]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1549 2046e4520c8bSEnji Cooper[CVE-2019-1547]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1547 2047e4520c8bSEnji Cooper[CVE-2019-1543]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1543 2048e4520c8bSEnji Cooper[CVE-2018-5407]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-5407 2049e4520c8bSEnji Cooper[CVE-2018-0739]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0739 2050e4520c8bSEnji Cooper[CVE-2018-0737]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0737 2051e4520c8bSEnji Cooper[CVE-2018-0735]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0735 2052e4520c8bSEnji Cooper[CVE-2018-0734]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0734 2053e4520c8bSEnji Cooper[CVE-2018-0733]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0733 2054e4520c8bSEnji Cooper[CVE-2018-0732]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0732 2055e4520c8bSEnji Cooper[CVE-2017-3738]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3738 2056e4520c8bSEnji Cooper[CVE-2017-3737]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3737 2057e4520c8bSEnji Cooper[CVE-2017-3736]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3736 2058e4520c8bSEnji Cooper[CVE-2017-3735]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3735 2059e4520c8bSEnji Cooper[CVE-2017-3733]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3733 2060e4520c8bSEnji Cooper[CVE-2017-3732]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3732 2061e4520c8bSEnji Cooper[CVE-2017-3731]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3731 2062e4520c8bSEnji Cooper[CVE-2017-3730]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3730 2063e4520c8bSEnji Cooper[CVE-2016-7055]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-7055 2064e4520c8bSEnji Cooper[CVE-2016-7054]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-7054 2065e4520c8bSEnji Cooper[CVE-2016-7053]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-7053 2066e4520c8bSEnji Cooper[CVE-2016-7052]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-7052 2067e4520c8bSEnji Cooper[CVE-2016-6309]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6309 2068e4520c8bSEnji Cooper[CVE-2016-6308]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6308 2069e4520c8bSEnji Cooper[CVE-2016-6307]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6307 2070e4520c8bSEnji Cooper[CVE-2016-6306]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6306 2071e4520c8bSEnji Cooper[CVE-2016-6305]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6305 2072e4520c8bSEnji Cooper[CVE-2016-6304]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6304 2073e4520c8bSEnji Cooper[CVE-2016-6303]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6303 2074e4520c8bSEnji Cooper[CVE-2016-6302]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6302 2075e4520c8bSEnji Cooper[CVE-2016-2183]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2183 2076e4520c8bSEnji Cooper[CVE-2016-2182]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2182 2077e4520c8bSEnji Cooper[CVE-2016-2181]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2181 2078e4520c8bSEnji Cooper[CVE-2016-2180]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2180 2079e4520c8bSEnji Cooper[CVE-2016-2179]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2179 2080e4520c8bSEnji Cooper[CVE-2016-2178]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2178 2081e4520c8bSEnji Cooper[CVE-2016-2177]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2177 2082e4520c8bSEnji Cooper[CVE-2016-2176]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2176 2083e4520c8bSEnji Cooper[CVE-2016-2109]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2109 2084e4520c8bSEnji Cooper[CVE-2016-2107]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2107 2085e4520c8bSEnji Cooper[CVE-2016-2106]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2106 2086e4520c8bSEnji Cooper[CVE-2016-2105]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2105 2087e4520c8bSEnji Cooper[CVE-2016-0800]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0800 2088e4520c8bSEnji Cooper[CVE-2016-0799]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0799 2089e4520c8bSEnji Cooper[CVE-2016-0798]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0798 2090e4520c8bSEnji Cooper[CVE-2016-0797]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0797 2091e4520c8bSEnji Cooper[CVE-2016-0705]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0705 2092e4520c8bSEnji Cooper[CVE-2016-0702]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0702 2093e4520c8bSEnji Cooper[CVE-2016-0701]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0701 2094e4520c8bSEnji Cooper[CVE-2015-3197]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-3197 2095e4520c8bSEnji Cooper[CVE-2015-3196]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-3196 2096e4520c8bSEnji Cooper[CVE-2015-3195]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-3195 2097e4520c8bSEnji Cooper[CVE-2015-3194]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-3194 2098e4520c8bSEnji Cooper[CVE-2015-3193]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-3193 2099e4520c8bSEnji Cooper[CVE-2015-1793]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1793 2100e4520c8bSEnji Cooper[CVE-2015-1792]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1792 2101e4520c8bSEnji Cooper[CVE-2015-1791]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1791 2102e4520c8bSEnji Cooper[CVE-2015-1790]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1790 2103e4520c8bSEnji Cooper[CVE-2015-1789]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1789 2104e4520c8bSEnji Cooper[CVE-2015-1788]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1788 2105e4520c8bSEnji Cooper[CVE-2015-1787]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1787 2106e4520c8bSEnji Cooper[CVE-2015-0293]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0293 2107e4520c8bSEnji Cooper[CVE-2015-0291]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0291 2108e4520c8bSEnji Cooper[CVE-2015-0290]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0290 2109e4520c8bSEnji Cooper[CVE-2015-0289]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0289 2110e4520c8bSEnji Cooper[CVE-2015-0288]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0288 2111e4520c8bSEnji Cooper[CVE-2015-0287]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0287 2112e4520c8bSEnji Cooper[CVE-2015-0286]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0286 2113e4520c8bSEnji Cooper[CVE-2015-0285]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0285 2114e4520c8bSEnji Cooper[CVE-2015-0209]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0209 2115e4520c8bSEnji Cooper[CVE-2015-0208]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0208 2116e4520c8bSEnji Cooper[CVE-2015-0207]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0207 2117e4520c8bSEnji Cooper[CVE-2015-0206]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0206 2118e4520c8bSEnji Cooper[CVE-2015-0205]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0205 2119e4520c8bSEnji Cooper[CVE-2015-0204]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0204 2120e4520c8bSEnji Cooper[CVE-2014-8275]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-8275 2121e4520c8bSEnji Cooper[CVE-2014-5139]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-5139 2122e4520c8bSEnji Cooper[CVE-2014-3572]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3572 2123e4520c8bSEnji Cooper[CVE-2014-3571]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3571 2124e4520c8bSEnji Cooper[CVE-2014-3570]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3570 2125e4520c8bSEnji Cooper[CVE-2014-3569]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3569 2126e4520c8bSEnji Cooper[CVE-2014-3568]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3568 2127e4520c8bSEnji Cooper[CVE-2014-3567]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3567 2128e4520c8bSEnji Cooper[CVE-2014-3566]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3566 2129e4520c8bSEnji Cooper[CVE-2014-3513]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3513 2130e4520c8bSEnji Cooper[CVE-2014-3512]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3512 2131e4520c8bSEnji Cooper[CVE-2014-3511]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3511 2132e4520c8bSEnji Cooper[CVE-2014-3510]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3510 2133e4520c8bSEnji Cooper[CVE-2014-3509]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3509 2134e4520c8bSEnji Cooper[CVE-2014-3508]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3508 2135e4520c8bSEnji Cooper[CVE-2014-3507]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3507 2136e4520c8bSEnji Cooper[CVE-2014-3506]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3506 2137e4520c8bSEnji Cooper[CVE-2014-3505]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3505 2138e4520c8bSEnji Cooper[CVE-2014-3470]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3470 2139e4520c8bSEnji Cooper[CVE-2014-0224]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0224 2140e4520c8bSEnji Cooper[CVE-2014-0221]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0221 2141e4520c8bSEnji Cooper[CVE-2014-0198]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0198 2142e4520c8bSEnji Cooper[CVE-2014-0195]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0195 2143e4520c8bSEnji Cooper[CVE-2014-0160]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0160 2144e4520c8bSEnji Cooper[CVE-2014-0076]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0076 2145e4520c8bSEnji Cooper[CVE-2013-6450]: https://www.openssl.org/news/vulnerabilities.html#CVE-2013-6450 2146e4520c8bSEnji Cooper[CVE-2013-6449]: https://www.openssl.org/news/vulnerabilities.html#CVE-2013-6449 2147e4520c8bSEnji Cooper[CVE-2013-4353]: https://www.openssl.org/news/vulnerabilities.html#CVE-2013-4353 2148e4520c8bSEnji Cooper[CVE-2013-0169]: https://www.openssl.org/news/vulnerabilities.html#CVE-2013-0169 2149e4520c8bSEnji Cooper[CVE-2013-0166]: https://www.openssl.org/news/vulnerabilities.html#CVE-2013-0166 2150e4520c8bSEnji Cooper[CVE-2012-2686]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-2686 2151e4520c8bSEnji Cooper[CVE-2012-2333]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-2333 2152e4520c8bSEnji Cooper[CVE-2012-2110]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-2110 2153e4520c8bSEnji Cooper[CVE-2012-0884]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-0884 2154e4520c8bSEnji Cooper[CVE-2012-0050]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-0050 2155e4520c8bSEnji Cooper[CVE-2012-0027]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-0027 2156e4520c8bSEnji Cooper[CVE-2011-4619]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-4619 2157e4520c8bSEnji Cooper[CVE-2011-4577]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-4577 2158e4520c8bSEnji Cooper[CVE-2011-4576]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-4576 2159e4520c8bSEnji Cooper[CVE-2011-4108]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-4108 2160e4520c8bSEnji Cooper[CVE-2011-3210]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-3210 2161e4520c8bSEnji Cooper[CVE-2011-3207]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-3207 2162e4520c8bSEnji Cooper[CVE-2011-0014]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-0014 2163e4520c8bSEnji Cooper[CVE-2010-5298]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-5298 2164e4520c8bSEnji Cooper[CVE-2010-4252]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-4252 2165e4520c8bSEnji Cooper[CVE-2010-4180]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-4180 2166e4520c8bSEnji Cooper[CVE-2010-3864]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-3864 2167e4520c8bSEnji Cooper[CVE-2010-2939]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-2939 2168e4520c8bSEnji Cooper[CVE-2010-1633]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-1633 2169e4520c8bSEnji Cooper[CVE-2010-0740]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-0740 2170e4520c8bSEnji Cooper[CVE-2010-0433]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-0433 2171e4520c8bSEnji Cooper[CVE-2009-3555]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-3555 2172e4520c8bSEnji Cooper[CVE-2009-0789]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-0789 2173e4520c8bSEnji Cooper[CVE-2009-0591]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-0591 2174e4520c8bSEnji Cooper[CVE-2009-0590]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-0590 2175e4520c8bSEnji Cooper[CVE-2008-5077]: https://www.openssl.org/news/vulnerabilities.html#CVE-2008-5077 2176e4520c8bSEnji Cooper[CVE-2006-4343]: https://www.openssl.org/news/vulnerabilities.html#CVE-2006-4343 2177e4520c8bSEnji Cooper[CVE-2006-4339]: https://www.openssl.org/news/vulnerabilities.html#CVE-2006-4339 2178e4520c8bSEnji Cooper[CVE-2006-3737]: https://www.openssl.org/news/vulnerabilities.html#CVE-2006-3737 2179e4520c8bSEnji Cooper[CVE-2006-2940]: https://www.openssl.org/news/vulnerabilities.html#CVE-2006-2940 2180e4520c8bSEnji Cooper[CVE-2006-2937]: https://www.openssl.org/news/vulnerabilities.html#CVE-2006-2937 2181e4520c8bSEnji Cooper[CVE-2005-2969]: https://www.openssl.org/news/vulnerabilities.html#CVE-2005-2969 218229536654SEnji Cooper[OpenSSL Guide]: https://www.openssl.org/docs/manmaster/man7/ossl-guide-introduction.html 218329536654SEnji Cooper[CHANGES.md]: ./CHANGES.md 218429536654SEnji Cooper[README-QUIC.md]: ./README-QUIC.md 218529536654SEnji Cooper[issue tracker]: https://github.com/openssl/openssl/issues 218629536654SEnji Cooper[CMVP]: https://csrc.nist.gov/projects/cryptographic-module-validation-program 218729536654SEnji Cooper[ESV]: https://csrc.nist.gov/Projects/cryptographic-module-validation-program/entropy-validations 218829536654SEnji Cooper[jitterentropy-library]: https://github.com/smuellerDD/jitterentropy-library 2189