@@ -12,6 +12,35 @@ before calling SSL_new();
12
12
13
13
*** end Note ***
14
14
15
+ yaSSL Release notes, version 2.3.8 (9/17/2015)
16
+ This release of yaSSL fixes a high security vulnerability. All users
17
+ SHOULD update. If using yaSSL for TLS on the server side with private
18
+ RSA keys allowing ephemeral key exchange you MUST update and regenerate
19
+ the RSA private keys. This report is detailed in:
20
+ https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf
21
+ yaSSL now detects RSA signature faults and returns an error.
22
+
23
+ yaSSL Patch notes, version 2.3.7e (6/26/2015)
24
+ This release of yaSSL includes a fix for Date less than comparison.
25
+ Previously yaSSL would return true on less than comparisons if the Dates
26
+ were equal. Reported by Oracle. No security problem, but if a cert was
27
+ generated right now, a server started using it in the same second, and a
28
+ client tried to verify it in the same second it would report not yet valid.
29
+
30
+ yaSSL Patch notes, version 2.3.7d (6/22/2015)
31
+ This release of yaSSL includes a fix for input_buffer set_current with
32
+ index 0. SSL_peek() at front of waiting data could trigger. Robert
33
+ Golebiowski of Oracle identified and suggested a fix, thanks!
34
+
35
+ yaSSL Patch notes, version 2.3.7c (6/12/2015)
36
+ This release of yaSSL does certificate DATE comparisons to the second
37
+ instead of to the minute, helpful when using freshly generated certs.
38
+ Though keep in mind that time sync differences could still show up.
39
+
40
+ yaSSL Patch notes, version 2.3.7b (3/18/2015)
41
+ This release of yaSSL fixes a potential crash with corrupted private keys.
42
+ Also detects bad keys earlier for user.
43
+
15
44
yaSSL Release notes, version 2.3.7 (12/10/2014)
16
45
This release of yaSSL fixes the potential to process duplicate handshake
17
46
messages by explicitly marking/checking received handshake messages.
0 commit comments