The annotated tag OpenSSL_1_0_1u has been created
        at  1883c9e66f488b03bacf2fb634ae0cda438352b1 (tag)
   tagging  888759a1d38197f29de7227876c3b58fbff8549f (commit)
  replaces  OpenSSL_1_0_1t
 tagged by  Matt Caswell
        on  Thu Sep 22 11:30:27 2016 +0100

- Log -----------------------------------------------------------------
OpenSSL 1.0.1u release tag
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAABAgAGBQJX47LDAAoJENnE0m0OYESREagIAIhmezllxDLm/jxDP+YfrcpO
R2sN77jbIR4v+V0O4ox+UI0QCI45YhiQAc9RbhmQzw6vlZk6bpCwRElQREPhZfRG
9zTU8uA7Cdmc6u2u84a//ciKtjcts1QsfT+yVYOM4QjijYNzl5W6/JVNhtCszv2v
GaDpcExS8MHsKqLZc8PalLxLRF2aSs9oVQ9K2thVPc4R0wuetsLoEIhxKY9Prc8b
PNpXp6QoKvpFFqsI1alZ/PQl6Oj/IpWYch66o2TzhkDqsuHX/qzSfkODhFmxGaps
b+mVtdwUMsPc0oWBphvjD81pdJs61/S2gCAEOy+giLDItaRJkg9OL+t5um410Qk=
=sOzA
-----END PGP SIGNATURE-----

Cesar Pereida (1):
      Fix DSA, preserve BN_FLG_CONSTTIME

David Woodhouse (1):
      Fix SSL_export_keying_material() for DTLS1_BAD_VER

Dmitry Belyavsky (1):
      Avoid KCI attack for GOST

Dr. Stephen Henson (29):
      add documentation
      Fix double free in d2i_PrivateKey().
      Fix name length limit check.
      Always try to set ASN.1 parameters for CMS.
      Use default ASN.1 for SEED.
      Only set CMS parameter when encrypting
      Tidy up PKCS12_newpass() fix memory leaks.
      Constify PKCS12_newpass()
      Only call FIPS_update, FIPS_final in FIPS mode.
      Update S/MIME certificates.
      Fix OOB read in TS_OBJ_print_bio().
      Check for overlows and error return from ASN1_object_size()
      Check for overflows in ASN1_object_size().
      include <limits.h>
      Calculate sequence length properly.
      Check for overflows in i2d_ASN1_SET()
      Limit recursion depth in old d2i_ASN1_bytes function
      Leak fixes.
      Sanity check input length in OPENSSL_uni2asc().
      Check for errors in a2d_ASN1_OBJECT()
      Check for errors in BN_bn2dec()
      Limit reads in do_b2i_bio()
      Sanity check ticket length.
      Avoid overflow in MDC2_Update()
      Fix small OOB reads.
      Remove unnecessary check.
      Use SSL3_HM_HEADER_LENGTH instead of 4.
      Make message buffer slightly larger than message.
      update default dependency options

Kazuki Yamaguchi (1):
      Fix overflow check in BN_bn2dec()

Kurt Roeckx (2):
      Return error when trying to print invalid ASN1 integer
      Fix off by 1 in ASN1_STRING_set()

Matt Caswell (16):
      Prepare for 1.0.1u-dev
      Check that the obtained public key is valid
      Fix error return value in SRP functions
      Avoid some undefined pointer arithmetic
      Update CONTRIBUTING
      More fix DSA, preserve BN_FLG_CONSTTIME
      Change usage of RAND_pseudo_bytes to RAND_bytes
      Convert memset calls to OPENSSL_cleanse
      Fix DTLS unprocessed records bug
      Fix DTLS replay protection
      Update function error code
      Fix DTLS buffered message DoS attack
      Prevent DTLS Finished message injection
      Fix OCSP Status Request extension unbounded memory growth
      Updates CHANGES and NEWS for new release
      Prepare for 1.0.1u release

Rich Salz (3):
      Recommend GH over RT, per team vote.
      RT3940: For now, just document the issue.
      SWEET32 (CVE-2016-2183): Move DES from HIGH to MEDIUM

Richard Levitte (4):
      Check that the subject name in a proxy cert complies to RFC 3820
      Fix proxy certificate pathlength verification
      Allow proxy certs to be present when verifying a chain
      make update to have PEM_R_HEADER_TOO_LONG defined

Viktor Dukhovni (2):
      Clarify negative return from X509_verify_cert()
      Ensure verify error is set when X509_verify_cert() fails

-----------------------------------------------------------------------
_____
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits

Reply via email to