@@ -17,48 +17,56 @@ Security
17
17
potential Bleichenbacher/BERserk-style attack.
18
18
19
19
Bugfix
20
- * Remove invalid use of size zero arrays in ECJPAKE test suite.
20
+ * Remove size zero arrays from ECJPAKE test suite. Size zero arrays are not
21
+ valid C and they prevented the test from compiling in Visual Studio 2015
22
+ and with GCC using the -Wpedantic compilation option.
21
23
* Fix insufficient support for signature-hash-algorithm extension,
22
24
resulting in compatibility problems with Chrome. Found by hfloyrd. #823
23
- * If sending a fatal alert fails, make sure not to hide the error
25
+ * Fix behaviour that hid the original cause of fatal alerts in some cases
26
+ when sending the alert failed. The fix makes sure not to hide the error
24
27
that triggered the alert.
25
- * In SSLv3, if refusing a renegotiation attempt, don't process any further
26
- data.
28
+ * Fix SSLv3 renegotiation behaviour and stop processing data received from
29
+ peer after sending a fatal alert to refuse a renegotiation attempt.
30
+ Previous behaviour was to keep processing data even after the alert has
31
+ been sent.
27
32
* Accept empty trusted CA chain in authentication mode
28
33
MBEDTLS_SSL_VERIFY_OPTIONAL.
29
- Fixes #864. Found by jethrogb.
30
- * Fix implementation of mbedtls_ssl_parse_certificate
31
- to not annihilate fatal errors in authentication mode
32
- MBEDTLS_SSL_VERIFY_OPTIONAL and to reflect bad EC curves
33
- within verification result.
34
- * Fix modular inversion function on invalid modulus 1 .
35
- Found by blaufish. Fixes #641.
36
- * Fix incorrect sign computation in modular exponentiation
37
- when dealing with negative MPI. Found by Guido Vranken.
38
- * Fix potential stack underflow in mpi_read_file.
39
- Found by Guido Vranken.
34
+ Found by jethrogb. #864
35
+ * Fix implementation of mbedtls_ssl_parse_certificate() to not annihilate
36
+ fatal errors in authentication mode MBEDTLS_SSL_VERIFY_OPTIONAL and to
37
+ reflect bad EC curves within verification result.
38
+ * Fix bug that caused the modular inversion function to accept the invalid
39
+ modulus 1 and therefore to hang. Found by blaufish. #641 .
40
+ * Fix incorrect sign computation in modular exponentiation when the base is
41
+ a negative MPI. Previously the result was always negative. Found by Guido
42
+ Vranken.
43
+ * Fix a numerical underflow leading to stack overflow in mpi_read_file()
44
+ that was triggered uppon reading an empty line. Found by Guido Vranken.
40
45
41
46
Changes
42
- * Send fatal alerts in many more cases instead of dropping the connection.
47
+ * Send fatal alerts in more cases. The previous behaviour was to skip
48
+ sending the fatal alert and just drop the connection.
43
49
* Clarify ECDSA documentation and improve the sample code to avoid
44
- misunderstandings and potentially dangerous use of the API. Pointed out
50
+ misunderstanding and potentially dangerous use of the API. Pointed out
45
51
by Jean-Philippe Aumasson.
46
52
47
53
= mbed TLS 2.5.0 branch released 2017-05-17
48
54
49
55
Security
50
56
* Wipe stack buffers in RSA private key operations
51
- (rsa_rsaes_pkcs1_v15_decrypt(), rsa_rsaes_oaep_decrypt).
52
- Found by Laurent Simon.
57
+ (rsa_rsaes_pkcs1_v15_decrypt(), rsa_rsaes_oaep_decrypt). Found by Laurent
58
+ Simon.
53
59
* Add exponent blinding to RSA private operations as a countermeasure
54
60
against side-channel attacks like the cache attack described in
55
61
https://arxiv.org/abs/1702.08719v2.
56
62
Found and fix proposed by Michael Schwarz, Samuel Weiser, Daniel Gruss,
57
63
Clémentine Maurice and Stefan Mangard.
58
64
59
65
Features
60
- * Exposed parts of the Elliptic Curve Point internal interface, to provide
61
- interface for external hardware acceleration code.
66
+ * Add hardware acceleration support for the Elliptic Curve Point module.
67
+ This involved exposing parts of the internal interface to enable
68
+ replacing the core functions and adding and alternative, module level
69
+ replacement support for enabling the extension of the interface.
62
70
* Add a new configuration option to 'mbedtls_ssl_config' to enable
63
71
suppressing the CA list in Certificate Request messages. The default
64
72
behaviour has not changed, namely every configured CAs name is included.
@@ -74,7 +82,12 @@ API Changes
74
82
Bugfix
75
83
* Remove macros from compat-1.3.h that correspond to deleted items from most
76
84
recent versions of the library. Found by Kyle Keen.
77
- * Fixed issue in mutexes to failing to initialise. #667
85
+ * Fixed issue in the Threading module that prevented mutexes from
86
+ initialising. Found by sznaider. #667 #843
87
+ * Add checks in the PK module for the RSA functions on 64-bit systems.
88
+ The PK and RSA modules use different types for passing hash length and
89
+ without these checks the type cast could lead to data loss. Found by Guido
90
+ Vranken.
78
91
79
92
= mbed TLS 2.4.2 branch released 2017-03-08
80
93
0 commit comments