We have released LibreSSL 3.5.4, which will be arriving in the LibreSSL directory of your local OpenBSD mirror soon. It includes the following security fix: * A malicious certificate revocation list or timestamp response token would allow an attacker to read arbitrary memory. It includes the following reliability fix: * An uninitialized variable was used in ASN1_STRING_to_UTF8() to decide whether the no-op freezero(NULL, 0) should be called. The LibreSSL project continues improvement of the codebase to reflect modern, safe programming practices. We welcome feedback and improvements from the broader community. Thanks to all of the contributors who helped make this release possible.