Changelog for
libtasn1-6-32bit-4.7-1.34.x86_64.rpm :
* Wed Sep 16 2015 zaitorAATTopensuse.org- Update to version 4.7:
* Fixed regression introduced in the decoding of multi-byte tags fix.
* Mon Sep 07 2015 astiegerAATTsuse.com- libtasn1 4.6:
* Allow decoding OCTET STRINGs with multi-byte tags.
* Add asn1_get_object_id_der
* Fri May 01 2015 astiegerAATTsuse.com- update libtasn1 4.5:
* Corrected an invalid memory access in octet string decoding. CVE-2015-3622 [boo#929414]
* Sun Mar 29 2015 astiegerAATTsuse.com- update to libtasn1 4.4 [bsc#924828]:
* Corrected a two-byte stack overflow in asn1_der_decoding. CVE-2015-2806
* Sun Mar 22 2015 mpluskalAATTsuse.com- Update project url- Cleanup spec-file with spec-cleaner- Add info preun and post dependencies- Update to 4.3
* Added asn1_decode_simple_ber()
* Sat Feb 14 2015 jengelhAATTinai.de- Put C API documentation into -devel package. Use modern %make_install. Description fix.
* Wed Oct 08 2014 tabrahamAATTsuse.com- updated to libtasn1 4.2:
* Noteworthy changes in release 4.2 (released 2014-09-15) [stable] - Added sanity checks in the decoding of time when ASN1_DECODE_FLAG_STRICT_DER is used. - Fixes in the decoding of OCTET STRING when close to the end of the structure.
* Noteworthy changes in release 4.1 (released 2014-08-23) [stable] - Corrected indefinite tag check in ANY constructions. That allows the decoding of BER-encoded structures that contain indefinite encoding within an ANY element. - Added DER decoding flag ASN1_DECODE_FLAG_STRICT_DER. Over the years BER functionality was added to the decoder and this flag provides the way to disable it. - API and ABI changes since last version: ASN1_DECODE_FLAG_STRICT_DER: New definition
* Noteworthy changes in release 4.0 (released 2014-06-26) [stable] - Optimized asn1_der_decoding_startEnd(). It no longer requires the additional decoding step. - asn1_read_value() understands the ?CURRENT keyword, which can be used to indicate the current element of a sequence, when the provided node is a sequence element. - Several optimizations in DER decoding of structures with sequences containing many elements. - asn1_der_decoding2() is introduced and allows flags to be passed on the decoding process. Currently only ASN1_DECODE_FLAG_ALLOW_PADDING is defined and that allows decoding DER structures that contain arbitrary data past their end. Contributed by Karel Slany. - API and ABI changes since last version: ASN1_DECODE_FLAG_ALLOW_PADDING: New definition asn1_dup_node: New function asn1_der_decoding2: New function asn1_der_decoding_element: It is now an alias to asn1_der_decoding
* Fri Jul 25 2014 mgorseAATTsuse.com- updated to libtasn1 3.7:
* Noteworthy changes in release 3.7 (released 2014-06-26) [stable] - Fixes in length calculation in _asn1_extract_der_octet(). - Fixes in DER decoding. - Fixes: CVE-2014-3468 CVE-2014-3467 CVE-2014-3469 bnc#880738 bnc#880737 bnc#880735
* Tue Jun 03 2014 meissnerAATTsuse.com- libtasn1.keyring: added Nikos Mavrogiannopoulos
key, who did this release (and shares responsibility with Simon).- updated to libtasn1 3.6
* Noteworthy changes in release 3.6 (released 2014-05-25) [stable] - Corrected an off-by-one error in ASN.1 DER tag decoding. (CVE-2014-3468/bnc#880735) - Several improvements and new safety checks on DER decoding; issues found using Codenomicon TLS test suite. (CVE-2014-3469/bnc#880738, CVE-2014-3467/bnc#880737) - Marked asn1_der_decoding_element() as deprecated. Use asn1_der_decoding() instead.
* Noteworthy changes in release 3.5 (released 2014-05-01) [stable] - Correctly handle decoding of recursive CHOICE options. - Allow deleting elements of SET OF. Patch by Jean-Louis Thekekara. - Several small bug fixes found by coverity. - Code improvements contributed by Kurt Roeckx.
* Noteworthy changes in release 3.4 (released 2013-11-25) [stable] - Added asn1_delete_structure2() which allows zeroizing the contents of all values in the structure prior to deinitialization. - The parser accepts negative numbers in an INTEGER range (but still does no enforce them).
* Tue Jun 25 2013 cooloAATTsuse.com- remove gpg source checking again to avoid this cycle: libtasn1 -> libssh2_org -> openssh -> krb5 -> python-Jinja2 -> vim -> libtasn1