Before initial release
Prior to release of LibreSSL portable the following features were removed.
MD2 and SEED algorithms 1
SSLv2 1
Compression 1
Kerberos support1
GOST1 (Alternative implementation added in later version)
CHIL1
- Cryptodev engine
LibreSSL 2.0
LibreSSL 2.0.0
12 Jul 2014 First release of LibreSSL portable is available Ports changeset
Initial release of LibreSSL portable
LibreSSL 2.0.1
13 Jul 2014 LibreSSL 2.0.1 released Ports changeset
This release includes a number of portability fixes based on the initial feedback we have received from the community. This includes among other things two new configure options to set OPENSSLDIR and ENGINESDIR. We have removed a few hard-coded compiler options that were problematic on some systems as well as -Werror. We have also re-synced with the latest OpenBSD sources as a number of issues were fixed upstream. This release also includes pkg-config support.
LibreSSL 2.0.2
16 Jul 2014 LibreSSL portable 2.0.2 released Ports changeset
This release addresses the Linux forking and pid wrap issue reported recently in the press.
LibreSSL 2.0.3
22 Jul 2014 LibreSSL 2.0.3 released/Ports changeset
This release includes a number of portability fixes based on the the feedback we have received from the community. It also includes some improvements to the fork detection support.
LibreSSL 2.0.4
03 Aug 2014 LibreSSL 2.0.4 released/Ports changeset This version includes more portability changes, as well as other work. most noticeable may be the deletion of the of the SRP code (which has not been enabled in any LibreSSL release).
Secure Remote Password (SRP) 2
LibreSSL 2.0.5
17 Aug 2014 LibreSSL 2.0.5 released/Ports changeset
This version forward-ports security fixes from OpenSSL 1.0.1i, including fixes for the following CVEs: CVE-2014-3506, CVE-2014-3507, CVE-2014-3509, CVE-2014-3510, CVE-2014-3511
CVE-2014-3508 (partially vulnerable) LibreSSL 2.0.4 was not found vulnerable to the following CVEs:<<BR>> CVE-2014-5139, CVE-2014-3512, CVE-2014-3505
LibreSSL 2.0.6
15 Oct 2015 See #LibreSSL_2.2.4
LibreSSL 2.1
For OpenBSD 5.7 (released 2015-05-01)
LibreSSL 2.1.0
13 Oct 2014 LibreSSL 2.1.0 released/LibreSSL 2.1.0
This release continues on with further work from after OpenBSD 5.6 code freeze. Our intention is to finalize LibreSSL 2.1 with OpenBSD 5.7
LibreSSL 2.1.1
17 Oct 2014 LibreSSL 2.1.1 released/LibreSSL 2.1.1
This release includes:
- Address POODLE attack by disabling SSLv3 by default
As well as continued ongoing fixes as we proactively change the codebase to reflect modern safe programming practices. The success of this is reflected in the fact that LibreSSL was not vulnerable to the two memory leak issues released on "OpenSSL Tuesday" - They were in fact initially fixed in LibreSSL.
LibreSSL 2.1.2
16 Dec 2014 LibreSSL 2.1.2 released/LibreSSL 2.1.2
This release greatly improves performance, interoperability and portability, while continuing to be easy to build and integrate into your software projects.
This release includes:
- Two important cipher suites, GOST and Camellia, have been reworked or re-enabled, providing better interoperability with systems around the world.
- A preview version of the libtls library, a modern and simplified interface for secure client and server communications, is now packaged and can be built optionally for testing.
- Initial support for Microsoft Windows 32-bit and 64-bit flavors has been added for mingw-w64 targets. This can be used to generate native libraries that are usable in other Windows development environments as well.
- Assembly acceleration of various algorithms for ELF (Linux, BSD, Solaris) and OS X systems are enabled for x86_64 CPU's. More optimizations may be enabled in later releases. These optimizations are disabled with the --disable-asm configure flag.
- The arc4random_buf(3) calls on FreeBSD and OS X are now replaced with the OpenBSD versions. This fixes current problems with seeding and fork safety until these OS's built-in implementations can be improved.
See these code commits for details:
LibreSSL 2.1.3
22 Jan 2015 LibreSSL 2.1.3 released/LibreSSL 2.1.3PR197005
GOST R 34.10-94 signature authentication.2
This release enhances security, OS and software compatibility, including:
- Fixes for various memory leaks in DTLS, including those for CVE-2015-0206.
- Application-Layer Protocol Negotiation (ALPN) support.
- Simplfied and refactored SSL/DTLS handshake code.
- SHA256 Camellia cipher suites for TLS 1.2 from RFC 5932.
- Earlier libtls support for non-blocking sockets and randomized session ID contexts. Work is ongoing with this library - feedback and potential use-cases are welcome.
- Support building Windows DLLs. Thanks to Jan Engelhard.
Packaged config wrapper for better compatibility with OpenSSL-based build systems. Thanks to @technion from GitHub.
- Ensure the stack is marked non-executable for assembly sections. Thanks to Anthony G. Bastile.
- Extra compiler hardening flags are enabled by default where applicable. Thanks to Jim Barlow.
- Initial HP-UX support. Thanks to Kinichiro Inoguchi.
Initial NetBSD support. Thanks to @gitisihara from GitHub.
LibreSSL 2.1.4
04 Mar 2015 LibreSSL 2.1.4 released/LibreSSL 2.1.4PR198269PR198270
This release adds a number of new security features, makes building privilege-separated programs simpler, and improves the libtls API.
This release also includes a binary package for convenience integrating LibreSSL on Windows platforms, and the latest source tarball is signed with GPG and signify for easier integration into existing build systems.
Feedback is welcome. Bugs, patches, and features requests can be reported to tech@openbsd.org or at GitHub
As the OpenBSD 5.7 development effort comes to a close, so does the LibreSSL 2.1.x branch. The next release will begin the 2.2.x development branch.
User-visible features:
- Improvements to libtls:
- a new API for loading CA chains directly from memory instead of a file, allowing verification with privilege separation in a chroot without direct access to CA certificate files.
- Ciphers default to TLSv1.2 with AEAD and PFS.
- Improved error handling and message generation
- New APIs and improved documentation
- Added X509_STORE_load_mem API for loading certificates from memory. This facilitates accessing certificates from a chroot'ed environment.
- New AEAD "MAC alias" allows configuring TLSv1.2 AEAD ciphers by using 'TLSv1.2+AEAD' as the cipher selection string.
- New openssl(1) command 'certhash' replaces the c_rehash script.
- Server-side support for TLS_FALLBACK_SCSV for compatibility with various auditor and vulnerability scanners.
Code improvements:
- Dead and disabled code removal including MD5, Netscape workarounds, non-POSIX IO, SCTP, RFC 3779 support, "#if 0" sections, and more.
- The ASN1 macros are expanded to aid readability and maintainability.
- Various NULL pointer asserts removed in favor of letting the OS/signal handler catch them.
- Refactored argument handling in openssl(1) for consistency and maintainability.
- Support for building with OPENSSL_NO_DEPRECATED
- Dozens of issues found with the Coverity scanner fixed.
Security updates:
- Fix a minor information leak that was introduced in t1_lib.c r1.71, whereby an additional 28 bytes of .rodata (or .data) is provided to the network. In most cases this is a on-issue since the memory content is already public. Issue found and reported by Felix Groebert of the Google Security Team.
- Fixes for the following low-severity issues were integrated into LibreSSL from OpenSSL 1.0.1k: CVE-2015-0205, CVE-2014-3570, CVE-2014-8275, CVE-2014-3572
- The following CVE's were fixed in earlier LibreSSL releases: CVE-2015-0206, CVE-2014-3510
- The following CVE's did not apply to LibreSSL: CVE-2014-3571, CVE-2014-3569, CVE-2015-0204 - RSA silently downgrades to EXPORT_RSA
LibreSSL 2.1.5
17 Mar 2015 LibreSSL 2.1.5 released/LibreSSL 2.1.5PR198651PR198681
This release is relatively small, focused on bug fixes before 2.2.x development begins along-side OpenBSD 5.8.
This or earlier LibreSSL releases may also address issues that are to be revealed by The OpenSSL Project Team on the 19th of March, 2015. The LibreSSL team is not typically apprised of OpenSSL-related security issues in advance. We will address any previously-unknown issues that are found to affect LibreSSL in future releases.
Issues addressed since 2.1.4:
- Fix incorrect comparison function in openssl(1) certhash command. Thanks to Christian Neukirchen / Void Linux.
- Windows port improvements and bug fixes.
- Removed a dependency on libgcc in 32-bit dynamic libraries.
- Correct a hang in openssl(1) reading from stdin on an connection.
- Initialize winsock in openssl(1) earlier, allow 'openssl ocsp' and any other network-related commands to function properly.
- Reject all server DH keys smaller than 1024 bits.
LibreSSL 2.1.6
19 Mar 2015 LibreSSL 2.1.6 released/LibreSSL 2.1.6PR198718
This release primarily addresses a number of security issues in coordination with the OpenSSL project.
Fixes for the following issues are integrated into LibreSSL 2.1.6: CVE-2015-0286, CVE-2015-0287, CVE-2015-0289, CVE-2015-0209, CVE-2015-0288.
The patch for this issue is integrated in LibreSSL 2.1.6: CVE-2015-0207 - LibreSSL is not vulnerable, but the fix was safe to merge.
The following issues were addressed in earlier LibreSSL releases: CVE-2015-0204 (2.1.2), CVE-2015-0292 (2.0.0), CVE-2015-1787 (2.0.1)
The following issues did not apply to LibreSSL 2.1.6: CVE-2015-0291, CVE-2015-0290, CVE-2015-0208, CVE-2015-0293, CVE-2015-0285
This release also enables the building of libtls by default, as the API and ABI are declared stable within the LibreSSL 2.1.x series. Further changes to libtls will resume with LibreSSL 2.2.x.
1 OpenBSD 5.6 Release announcement
2 LibreSSL Portable ChangeLog
LibreSSL 2.1.7
11 Jun 2015
- Fixes for the following issues are integrated into
- LibreSSL 2.1.7 and 2.2.0:
- - CVE-2015-1788 - Malformed ECParameters causes infinite loop - CVE-2015-1789 - Exploitable out-of-bounds read in X509_cmp_time - CVE-2015-1792 - CMS verify infinite loop with unknown hash function (this code is not enabled by default)
LibreSSL 2.1.8
15 Oct 2015 See LibreSSL 2.2.4
LibreSSL 2.1.9
08 Dec 2015 See LibreSSL 2.2.5
LibreSSL 2.2
For OpenBSD 5.8 (release 2015-11-01)
LibreSSL 2.2.0
11 Jun 2015
As part of OpenBSD 5.7
Bumps libcrypto shlibver from 32 to 33
User-visible features:
- Reluctantly add server-side support for TLS_FALLBACK_SCSV.
- Import BoringSSL's crypto bytestring and crypto bytebuilder APIs.
- Jettison DTLS over SCTP.
- Move openssl(1) from /usr/sbin/openssl to /usr/bin/openssl.
- Two important cipher suites, GOST and Camellia, have been reworked or reenabled, providing better interoperability with systems around the world.
- libtls: New API for loading CA chains directly from memory instead of a file, allowing verification with privilege separation in a chroot(8) without direct access to CA certificate files.
- libtls: Ciphers default to TLSv1.2 with AEAD and PFS.
- libtls: Improved error handling and message generation.
- Added X509_STORE_load_mem API for loading certificates from memory. This facilitates accessing certificates from a chrooted environment.
- New AEAD "MAC alias" allows configuring TLSv1.2 AEAD ciphers by using 'TLSv1.2+AEAD' as the cipher selection string.
- New openssl(1) command 'certhash' replaces the c_rehash script.
- Application-Layer Protocol Negotiation (ALPN) support.
Code improvements:
- Dead and disabled code removal including MD5, Netscape workarounds, non-POSIX IO, SCTP, RFC 3779 support, "#if 0" sections, and more.
- The ASN1 macros are expanded to aid readability and maintainability.
- Various NULL pointer asserts removed in favor of letting the OS/signal handler catch them.
- Dozens of issues found with the Coverity scanner fixed.
Security updates:
- Fix a Bleichenbacher style timing oracle with bad PKCS padding.
- Fix memory leaks.
- Address POODLE attack by disabling SSLv3 by default.
- SHA256 Camellia cipher suites for TLS 1.2 from RFC 5932.
- Earlier libtls support for non-blocking sockets and randomized session ID contexts.
- Ensure the stack is marked non-executable for assembly sections.
- Multiple CVEs fixed including CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3509, CVE-2014-3510, CVE-2014-3511, CVE-2014-3570, CVE-2014-3572, CVE-2014-8275, CVE-2015-0205 and CVE-2015-0206.
- CVE-2015-4000 DHE man-in-the-middle protection (Logjam) medium Not vulnerable
- CVE-2015-1788 Malformed ECParameters causes infinite loop medium Fixed in 2.1.7/2.2.0
- CVE-2015-1789 Exploitable out-of-bounds read in X509_cmp_time medium Fixed in 2.1.7/2.2.0
CVE-2015-1790 PKCS7 crash with missing EnvelopedContent medium Not vulnerable
- CVE-2015-1792 CMS verify infinite loop with unknown hash function medium Fixed in 2.1.7/2.2.0
CVE-2015-1791 Race condition handling NewSessionTicket low In review
- CVE-2014-8176 Invalid free in DTLS medium Not vulnerable
- A new define has been added to make porting easier
- OPENSSL_NO_EGD is defined in opensslfeatures.h using the standard disabled features naming-scheme
LibreSSL 2.2.1
08 July 2015 LibreSSL 2.2.1 released Code Review Ports commit
Shared library versions
libcrypto |
34 |
libssl |
33 |
libtls |
4 |
Build fixes, feature added, features removed
- Assorted build fixes for musl, HP-UX, Mingw, Solaris.
- Initial support for Windows 2009, 2003, XP
Protocol parsing conversions to BoringSSL's CRYPTO ByteString (CBS) API
- Added EC_curve_nid2nist and EC_curve_nist2nid from OpenSSL
- Removed Dynamic Engine support
- Removed unused and obsolete MDC-2DES cipher
- Removed workarounds for obsolete SSL implementations
LibreSSL 2.2.2
06 Aug 2015 LibreSSL 2.2.2 released Code Review
Shared library versions
libcrypto |
35 |
libssl |
35 |
libtls |
6 |
- Switched 'openssl dhparam' default from 512 to 2048 bits
- Reworked openssl(1) option handling
More CRYPTO ByteString (CBC) packet parsing conversions
- Fixed 'openssl pkeyutl -verify' to exit with a 0 on success
- Fixed dozens of Coverity issues including dead code, memory leaks, logic errors and more.
- Ensure that openssl(1) restores terminal echo state after reading a password.
- Incorporated fix for OpenSSL Issue #3683
- LibreSSL version define LIBRESSL_VERSION_NUMBER will now be bumped for each portable release.
- Removed workarounds for TLS client padding bugs.
- No longer disable ECDHE-ECDSA on OS X
- Removed SSLv3 support from openssl(1)
- Removed IE 6 SSLv3 workarounds.
- Modified tls_write in libtls to allow partial writes, clarified with examples in the documentation.
- Removed RSAX engine
- Tested SSLv3 removal with the OpenBSD ports tree and found several applications that were not ready to build without SSLv3 yet. For now, building a program that intentionally uses SSLv3 will result in a linker warning.
- Added TLS_method, TLS_client_method and TLS_server_method as a replacement for the SSLv23_*method calls.
- Added initial cmake build support, including support for building with Visual Studio, currently working with Visual Studio 2013 Community Edition. There are some issues with earlier versions of Visual Studio that will be resolved in a future release.
- --with-enginesdir is removed as a configuration parameter
- Default cert.pem, openssl.cnf, and x509v3.cnf files are now installed under $sysconfdir/ssl or the directory specified by --with-openssldir. Previous versions of LibreSSL left these empty.
The LibreSSL project continues improvement of the codebase to reflect modern, safe programming practices. We welcome feedback and improvements from the broader community. Thanks to all of the contributors who helped make this release possible.
LibreSSL 2.2.3
29 Aug 2015 LibreSSL 2.2.3 Released
- bugfix release
LibreSSL 2.2.2 incorrectly handles ClientHello messages that do not include TLS extensions, resulting in such handshakes being aborted. This release corrects the handling of such messages.
- No shlib bumps
LibreSSL 2.2.4
15 Oct 2015 Oct 15 OpenBSD errata and LibreSSL releases
- LibreSSL 2.2.4 fixes a memory leak and buffer overflow (off-by-one) in OBJ_obj2txt() that was discovered by Qualys when reviewing the OpenSMTPD code
- No shlib bumps
LibreSSL 2.2.5
08 Dec 2015 LibreSSL 2.2.5 and 2.1.9 released
- Fixes from OpenSSL 1.0.1q
- CVE-2015-3194 - NULL pointer dereference in client side certificate validation.
- CVE-2015-3195 - Memory leak in PKCS7 - not reachable from TLS/SSL
- The following OpenSSL CVEs did not apply to LibreSSL
- CVE-2015-3193 - Carry propagating bug in the x86_64 Montgomery squaring procedure.
- CVE-2015-3196 - Double free race condition of the identify hint data.
See OpenBSD errata, Dec 3, 2015 for details.
LibreSSL 2.2.6
See 2.3.2
LibreSSL 2.2.7
See 2.3.4
LibreSSL 2.3
Based on the development branch for OpenBSD 5.9 (release 2016-05-01).
The API will be stable around March 2016. This version will be security/libressl-devel until the OpenBSD project declares the API stable.
This version marks the removal of SHA-0 and SSLv3.
LibreSSL 2.3.0
23 Sep 2015 LibreSSL 2.3.0 Released Code Review
- SSLv3 is now permanently removed from the tree.
The libtls API is changed from the 2.2.x series:
The tls_read/write functions now work better with external event libraries. See the tls_init man page for examples of using libtls correctly in asynchronous mode.
Client-side verification is now supported, with the client supplying the certificate to the server.
When using tls_connect_fds, tls_connect_socket or tls_accept_fds, libtls no longer implicitly closes the passed in sockets. The caller is responsible for closing them in this case.
When loading a DSA key from an raw (without DH parameters) ASN.1 serialization, perform some consistency checks on its p' and q' values, and return an error if the checks failed.
- Fixed a bug in ECDH_compute_key that can lead to silent truncation of the result key without error. A coding error could cause software to use much shorter keys than intended.
- Removed support for DTLS_BAD_VER. Pre-DTLSv1 implementations are no longer supported.
- The engine command and parameters are removed from the openssl(1).
- SHA-0 is removed, which was withdrawn shortly after publication 20 years ago.
- Added Certplus CA root certificate to the default cert.pem file.
- New interface OPENSSL_cpu_caps is provided that does not allow software to inadvertently modify cpu capability flags. OPENSSL_ia32cap and OPENSSL_ia32cap_loc are removed.
- The out_len argument of AEAD changed from ssize_t to size_t.
- Deduplicated DTLS code, sharing bugfixes and improvements with TLS.
- Converted 'nc' to use libtls for client and server operations; it is included in the libressl-portable distribution as an example of how to use the libtls library. This is intended to be a simpler and more robust replacement for 'openssl s_client' and 'openssl s_server' for day-to-day operations.
Shared library versions
libcrypto |
35 |
libssl |
36 |
libtls |
7 |
LibreSSL 2.3.1
03 Nov 2015 LibreSSL 2.3.1 released Code Review
2.3.1 - ASN.1 and time handling cleanups
- ASN.1 cleanups and RFC5280 compliance fixes.
- Time representations switched from 'unsigned long' to 'time_t'. LibreSSL now checks if the host OS supports 64-bit time_t.
- Fixed a leak in SSL_new in the error path.
- Support always extracting the peer cipher and version with libtls.
- Added ability to check certificate validity times with libtls, tls_peer_cert_notbefore and tls_peer_cert_notafter.
- Changed tls_connect_servername to use the first address that resolves with getaddrinfo().
- Remove broken conditional EVP_CHECK_DES_KEY code (non-functional since initial commit in 2004).
- Fixed a memory leak and out-of-bounds access in OBJ_obj2txt, reported by Qualys Security.
Fixed an up-to 7 byte overflow in RC4 when len is not a multiple of sizeof(RC4_CHUNK), reported by Pascal Cuoq <cuoq at trust-in-soft.com>.
- Reject too small bits value in BN_generate_prime_ex(), so that it does not risk becoming negative in probable_prime_dh_safe(), reported by Franck Denis.
- Enable nc(1) builds on more platforms.
- No shlib bumps
LibreSSL 2.3.2
29 Jan 2016 LibreSSL 2.3.2, 2.2.6 and 2.2.10 released Code Review
- Fixing the CVE-2015-1794 vulnerability
- No shlib bumps
LibreSSL 2.3.3
23 Mar 2016 LibreSSL 2.3.3 Released
This release marks the beginning of stable development of the 2.3.x branch. LibreSSL 2.3.3 is identical to the version that will be shipped with OpenBSD 5.9 in May 2016. At that time, LibreSSL 2.1.x support will also end.
LibreSSL 2.3.3 has the following changes:
- Reworked build scripts to better sync with OpenNTPD-portable
- Fixed broken manpage links
- Fixed an nginx compatibility issue by adding an 'install_sw' make alias
- Fixed HP-UX builds
- Changed the default configuration directory to c:\LibreSSL\ssl on Windows binary builds
- cert.pem has been reorganized and synced with Mozilla's certificate store
LibreSSL 2.3.3
22 March 2016 http://marc.info/?l=openbsd-announce&m=146228598930416
We have released LibreSSL 2.3.3, which will be arriving in the LibreSSL directory of your local OpenBSD mirror soon.
This release marks the beginning of stable development of the 2.3.x branch. LibreSSL 2.3.3 is identical to the version that will be shipped with OpenBSD 5.9 in May 2016. At that time, LibreSSL 2.1.x support will also end.
LibreSSL 2.3.3 has the following changes:
- Reworked build scripts to better sync with OpenNTPD-portable
- Fixed broken manpage links
- Fixed an nginx compatibility issue by adding an 'install_sw' make alias
- Fixed HP-UX builds
- Changed the default configuration directory to c:\LibreSSL\ssl on Windows
- binary builds
- cert.pem has been reorganized and synced with Mozilla's certificate store
LibreSSL 2.3.4
03 May 2016 http://marc.info/?l=openbsd-announce&m=146457845605121
We have released LibreSSL 2.3.4, which will be arriving in the LibreSSL directory of your local OpenBSD mirror soon.
This release is based on the stable OpenBSD 5.9 branch.
- Fix multiple vulnerabilities in libcrypto relating to ASN.1 and encoding.
- From OpenSSL.
- Minor build fixes
The LibreSSL project continues improvement of the codebase to reflect modern, safe programming practices. We welcome feedback and improvements from the broader community. Thanks to all of the contributors who helped make this release possible.
LibreSSL 2.3.5
31 May 2016 http://marc.info/?l=openbsd-announce&m=146475052720713
We have released LibreSSL 2.3.5, which will be arriving in the LibreSSL directory of your local OpenBSD mirror soon.
This release is based on the stable OpenBSD 5.9 branch.
Fixed an error in libcrypto when parsing some ASN.1 elements > 16k
The LibreSSL project continues improvement of the codebase to reflect modern, safe programming practices. We welcome feedback and improvements from the broader community. Thanks to all of the contributors who helped make this release possible.
LibreSSL 2.3.6
09 Jun 2016 http://marc.info/?l=openbsd-announce&m=146522317201596
LibreSSL 2.4
LibreSSL 2.4.0
31 May 2016 http://marc.info/?l=openbsd-announce&m=146475052720713
We have released LibreSSL 2.4.0, which will be arriving in the LibreSSL directory of your local OpenBSD mirror soon.
This release is the first snapshot based on the development OpenBSD 6.0 branch. As such, it is likely to change more compared to the 2.3.x and 2.2.x branches. See http://www.libressl.org/releases.html for more details.
LibreSSL 2.4.0 contains the following changes:
- Many improvements to the CMake build infrastructure, including
- Solaris, mingw-w64, Cygwin, and HP-UX support. Thanks to Kinichiro Inoguchi for this work.
- Added missing error handling around bn_wexpand() calls.
- Added explicit_bzero calls for freed ASN.1 objects.
- Fixed X509_*set_object functions to return 0 on allocation failure.
Implemented the IETF ChaCha20-Poly1305 cipher suites.
- Changed default EVP_aead_chacha20_poly1305() implementation to the
- IETF version, which is now the default.
- Fixed password prompts from openssl(1) to properly handle ^C.
- Reworked error handling in libtls so that configuration errors are
- visible.
- Deprecated internal use of EVP_[Cipher|Encrypt|Decrypt]_Final.
The LibreSSL project continues improvement of the codebase to reflect modern, safe programming practices. We welcome feedback and improvements from the broader community. Thanks to all of the contributors who helped make this release possible.
LibreSSL 2.4.1
09 Jun 2016 http://marc.info/?l=openbsd-announce&m=146522317201596
We have released LibreSSL 2.4.1, which will be arriving in the LibreSSL directory of your local OpenBSD mirror soon.
This release is based on the development OpenBSD 6.0 branch.
- Correct a problem that prevents the DSA signing algorithm from
- running in constant time even if the flag BN_FLG_CONSTTIME is set. This issue was reported by Cesar Pereida (Aalto University), Billy Brumley (Tampere University of Technology), and Yuval Yarom (The University of Adelaide and NICTA). The fix was developed by Cesar Pereida.
The LibreSSL project continues improvement of the codebase to reflect modern, safe programming practices. We welcome feedback and improvements from the broader community. Thanks to all of the contributors who helped make this release possible.