@@ -12,6 +12,35 @@ before calling SSL_new();
1212
1313*** end Note ***
1414
15+ yaSSL Release notes, version 2.3.8 (9/17/2015)
16+ This release of yaSSL fixes a high security vulnerability. All users
17+ SHOULD update. If using yaSSL for TLS on the server side with private
18+ RSA keys allowing ephemeral key exchange you MUST update and regenerate
19+ the RSA private keys. This report is detailed in:
20+ https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf
21+ yaSSL now detects RSA signature faults and returns an error.
22+
23+ yaSSL Patch notes, version 2.3.7e (6/26/2015)
24+ This release of yaSSL includes a fix for Date less than comparison.
25+ Previously yaSSL would return true on less than comparisons if the Dates
26+ were equal. Reported by Oracle. No security problem, but if a cert was
27+ generated right now, a server started using it in the same second, and a
28+ client tried to verify it in the same second it would report not yet valid.
29+
30+ yaSSL Patch notes, version 2.3.7d (6/22/2015)
31+ This release of yaSSL includes a fix for input_buffer set_current with
32+ index 0. SSL_peek() at front of waiting data could trigger. Robert
33+ Golebiowski of Oracle identified and suggested a fix, thanks!
34+
35+ yaSSL Patch notes, version 2.3.7c (6/12/2015)
36+ This release of yaSSL does certificate DATE comparisons to the second
37+ instead of to the minute, helpful when using freshly generated certs.
38+ Though keep in mind that time sync differences could still show up.
39+
40+ yaSSL Patch notes, version 2.3.7b (3/18/2015)
41+ This release of yaSSL fixes a potential crash with corrupted private keys.
42+ Also detects bad keys earlier for user.
43+
1544yaSSL Release notes, version 2.3.7 (12/10/2014)
1645 This release of yaSSL fixes the potential to process duplicate handshake
1746 messages by explicitly marking/checking received handshake messages.
0 commit comments