fix CVE-2015-1792 - CMS verify infinite loop with unknown hash function
[1.0.1e-39]
fix CVE-2015-3216 - regression in RAND locking that can cause segfaults on
read in multithreaded applications
[1.0.1e-38]
fix CVE-2015-4000 - prevent the logjam attack on client - restrict
the DH key size to at least 768 bits (limit will be increased in future)
[1.0.1e-37]
drop the AES-GCM restriction of 2^32 operations because the IV is
always 96 bits (32 bit fixed field + 64 bit invocation field)
[1.0.1e-36]
update fix for CVE-2015-0287 to what was released upstream
[1.0.1e-35]
fix CVE-2015-0209 - potential use after free in d2i_ECPrivateKey()
fix CVE-2015-0286 - improper handling of ASN.1 boolean comparison
fix CVE-2015-0289 - NULL dereference decoding invalid PKCS#7 data
fix CVE-2015-0292 - integer underflow in base64 decoder
fix CVE-2015-0293 - triggerable assert in SSLv2 server
[1.0.1e-34]
copy digest algorithm when handling SNI context switch
improve documentation of ciphersuites - patch by Hubert Kario
add support for setting Kerberos service and keytab in
s_server and s_client
[1.0.1e-33]
fix CVE-2014-3570 - incorrect computation in BN_sqr()
fix CVE-2014-3571 - possible crash in dtls1_get_record()
fix CVE-2014-3572 - possible downgrade of ECDH ciphersuite to non-PFS state
fix CVE-2014-8275 - various certificate fingerprint issues
fix CVE-2015-0204 - remove support for RSA ephemeral keys for non-export
ciphersuites and on server
fix CVE-2015-0205 - do not allow unauthenticated client DH certificate
fix CVE-2015-0206 - possible memory leak when buffering DTLS records
[1.0.1e-32]
use FIPS approved method for computation of d in RSA
[1.0.1e-31]
fix CVE-2014-3567 - memory leak when handling session tickets
fix CVE-2014-3513 - memory leak in srtp support
add support for fallback SCSV to partially mitigate CVE-2014-3566
(padding attack on SSL3)
[1.0.1e-30]
add ECC TLS extensions to DTLS (#1119800)
[1.0.1e-29]
fix CVE-2014-3505 - doublefree in DTLS packet processing
fix CVE-2014-3506 - avoid memory exhaustion in DTLS
fix CVE-2014-3507 - avoid memory leak in DTLS
fix CVE-2014-3508 - fix OID handling to avoid information leak
fix CVE-2014-3509 - fix race condition when parsing server hello
fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS
fix CVE-2014-3511 - disallow protocol downgrade via fragmentation
[1.0.1e-28]
fix CVE-2014-0224 fix that broke EAP-FAST session resumption support
[1.0.1e-26]
drop EXPORT, RC2, and DES from the default cipher list (#1057520)
print ephemeral key size negotiated in TLS handshake (#1057715)
do not include ECC ciphersuites in SSLv2 client hello (#1090952)
properly detect encryption failure in BIO (#1100819)
fail on hmac integrity check if the .hmac file is empty (#1105567)
FIPS mode: make the limitations on DSA, DH, and RSA keygen
length enforced only if OPENSSL_ENFORCE_MODULUS_BITS environment
variable is set
[1.0.1e-25]
fix CVE-2010-5298 - possible use of memory after free
fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment
fix CVE-2014-0198 - possible NULL pointer dereference
fix CVE-2014-0221 - DoS from invalid DTLS handshake packet
fix CVE-2014-0224 - SSL/TLS MITM vulnerability
fix CVE-2014-3470 - client-side DoS when using anonymous ECDH
[1.0.1e-24]
add back support for secp521r1 EC curve
[1.0.1e-23]
fix CVE-2014-0160 - information disclosure in TLS heartbeat extension
[1.0.1e-22]
use 2048 bit RSA key in FIPS selftests
[1.0.1e-21]
add DH_compute_key_padded needed for FIPS CAVS testing
make 3des strength to be 128 bits instead of 168 (#1056616)
FIPS mode: do not generate DSA keys and DH parameters < 2048 bits
FIPS mode: use approved RSA keygen (allows only 2048 and 3072 bit keys)
FIPS mode: add DH selftest
FIPS mode: reseed DRBG properly on RAND_add()
FIPS mode: add RSA encrypt/decrypt selftest
FIPS mode: add hard limit for 2^32 GCM block encryptions with the same key
use the key length from configuration file if req -newkey rsa is invoked
[1.0.1e-20]