=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/59.html,v retrieving revision 1.17 retrieving revision 1.18 diff -c -r1.17 -r1.18 *** www/59.html 2016/02/03 15:00:51 1.17 --- www/59.html 2016/02/03 16:40:02 1.18 *************** *** 130,136 ****

--- 149,174 ---- forwarding for cases when the X server disables the SECURITY extension.

  • Fix an out of-bound read access in the packet handling code. !
  • Further use of ! explicit_bzero(3) ! has been added in various buffer handling code paths to guard against ! compilers aggressively doing dead-store removal.
  • The following significant bugs have been fixed in this release:

    *************** *** 198,206 ****

  • Fixed an up-to 7 byte overflow in RC4 when len is not a multiple of sizeof(RC4_CHUNK).
  • Added EVP_aead_chacha20_poly1305_ietf() which matches the ! AEAD construction introduced in RFC 7539, which is different than that ! already used in TLS with EVP_aead_chacha20_poly1305(). !
  • More man pages converted from pod to mdoc format.
  • Added COMODO RSA Certification Authority and QuoVadis root certificates to cert.pem.
  • Removed Remhve "C=US, O=VeriSign, Inc., OU=Class 3 Public Primary --- 199,210 ----
  • Fixed an up-to 7 byte overflow in RC4 when len is not a multiple of sizeof(RC4_CHUNK).
  • Added EVP_aead_chacha20_poly1305_ietf() which matches the ! AEAD construction introduced in RFC 7539, which is different ! than that already used in TLS with ! EVP_aead_chacha20_poly1305(). !
  • More man pages converted from pod to ! mdoc(7) ! format.
  • Added COMODO RSA Certification Authority and QuoVadis root certificates to cert.pem.
  • Removed Remhve "C=US, O=VeriSign, Inc., OU=Class 3 Public Primary *************** *** 232,239 ****
  • SSLv3 is now permanently removed from the tree.
  • The libtls API is changed from the 2.2.x series:
      !
    • The tls_read/write functions now work better with external event ! libraries.
    • Client-side verification is now supported, with the client supplying the certificate to the server.
    • Also, when using tls_connect_fds, --- 236,243 ----
    • SSLv3 is now permanently removed from the tree.
    • The libtls API is changed from the 2.2.x series:
        !
      • The tls_read/write functions now work better ! with external event libraries.
      • Client-side verification is now supported, with the client supplying the certificate to the server.
      • Also, when using tls_connect_fds, *************** *** 244,251 ****
      • New interface OPENSSL_cpu_caps is provided that does not allow software to inadvertently modify cpu capability flags. OPENSSL_ia32cap and OPENSSL_ia32cap_loc are removed. !
      • The out_len argument of AEAD changed from ssize_t ! to size_t.
      • Deduplicated DTLS code, sharing bugfixes and improvements with TLS.
      • Converted nc(1) --- 248,255 ----
      • New interface OPENSSL_cpu_caps is provided that does not allow software to inadvertently modify cpu capability flags. OPENSSL_ia32cap and OPENSSL_ia32cap_loc are removed. !
      • The out_len argument of AEAD changed from ! ssize_t to size_t.
      • Deduplicated DTLS code, sharing bugfixes and improvements with TLS.
      • Converted nc(1) *************** *** 263,276 ****
      • Added ability to check certificate validity times with libtls, tls_peer_cert_notbefore and tls_peer_cert_notafter. !
      • Changed tls_connect_servername to use the first address that ! resolves with getaddrinfo().
      • Remove broken conditional EVP_CHECK_DES_KEY code (non-functional since initial commit in 2004).
      • Reject too small bits value in BN_generate_prime_ex(), so that it does not risk becoming negative in probable_prime_dh_safe(). !
      • Changed format of LIBRESSL_VERSION_NUMBER to match that of OPENSSL_VERSION_NUMBER.
      • Avoid a potential undefined C99+ behavior due to shift overflow in AES_decrypt. --- 267,281 ----
      • Added ability to check certificate validity times with libtls, tls_peer_cert_notbefore and tls_peer_cert_notafter. !
      • Changed tls_connect_servername to use the first address that ! resolves with ! getaddrinfo(3).
      • Remove broken conditional EVP_CHECK_DES_KEY code (non-functional since initial commit in 2004).
      • Reject too small bits value in BN_generate_prime_ex(), so that it does not risk becoming negative in probable_prime_dh_safe(). !
      • Changed format of LIBRESSL_VERSION_NUMBER to match that of OPENSSL_VERSION_NUMBER.
      • Avoid a potential undefined C99+ behavior due to shift overflow in AES_decrypt.