Skip to content

Commit 5a1c0e7

Browse files
committed
Improve Changelog
1 parent 9065191 commit 5a1c0e7

File tree

1 file changed

+35
-22
lines changed

1 file changed

+35
-22
lines changed

ChangeLog

+35-22
Original file line numberDiff line numberDiff line change
@@ -17,48 +17,56 @@ Security
1717
potential Bleichenbacher/BERserk-style attack.
1818

1919
Bugfix
20-
* Remove invalid use of size zero arrays in ECJPAKE test suite.
20+
* Remove size zero arrays from ECJPAKE test suite. Size zero arrays are not
21+
valid C and they prevented the test from compiling in Visual Studio 2015
22+
and with GCC using the -Wpedantic compilation option.
2123
* Fix insufficient support for signature-hash-algorithm extension,
2224
resulting in compatibility problems with Chrome. Found by hfloyrd. #823
23-
* If sending a fatal alert fails, make sure not to hide the error
25+
* Fix behaviour that hid the original cause of fatal alerts in some cases
26+
when sending the alert failed. The fix makes sure not to hide the error
2427
that triggered the alert.
25-
* In SSLv3, if refusing a renegotiation attempt, don't process any further
26-
data.
28+
* Fix SSLv3 renegotiation behaviour and stop processing data received from
29+
peer after sending a fatal alert to refuse a renegotiation attempt.
30+
Previous behaviour was to keep processing data even after the alert has
31+
been sent.
2732
* Accept empty trusted CA chain in authentication mode
2833
MBEDTLS_SSL_VERIFY_OPTIONAL.
29-
Fixes #864. Found by jethrogb.
30-
* Fix implementation of mbedtls_ssl_parse_certificate
31-
to not annihilate fatal errors in authentication mode
32-
MBEDTLS_SSL_VERIFY_OPTIONAL and to reflect bad EC curves
33-
within verification result.
34-
* Fix modular inversion function on invalid modulus 1.
35-
Found by blaufish. Fixes #641.
36-
* Fix incorrect sign computation in modular exponentiation
37-
when dealing with negative MPI. Found by Guido Vranken.
38-
* Fix potential stack underflow in mpi_read_file.
39-
Found by Guido Vranken.
34+
Found by jethrogb. #864
35+
* Fix implementation of mbedtls_ssl_parse_certificate() to not annihilate
36+
fatal errors in authentication mode MBEDTLS_SSL_VERIFY_OPTIONAL and to
37+
reflect bad EC curves within verification result.
38+
* Fix bug that caused the modular inversion function to accept the invalid
39+
modulus 1 and therefore to hang. Found by blaufish. #641.
40+
* Fix incorrect sign computation in modular exponentiation when the base is
41+
a negative MPI. Previously the result was always negative. Found by Guido
42+
Vranken.
43+
* Fix a numerical underflow leading to stack overflow in mpi_read_file()
44+
that was triggered uppon reading an empty line. Found by Guido Vranken.
4045

4146
Changes
42-
* Send fatal alerts in many more cases instead of dropping the connection.
47+
* Send fatal alerts in more cases. The previous behaviour was to skip
48+
sending the fatal alert and just drop the connection.
4349
* Clarify ECDSA documentation and improve the sample code to avoid
44-
misunderstandings and potentially dangerous use of the API. Pointed out
50+
misunderstanding and potentially dangerous use of the API. Pointed out
4551
by Jean-Philippe Aumasson.
4652

4753
= mbed TLS 2.5.0 branch released 2017-05-17
4854

4955
Security
5056
* Wipe stack buffers in RSA private key operations
51-
(rsa_rsaes_pkcs1_v15_decrypt(), rsa_rsaes_oaep_decrypt).
52-
Found by Laurent Simon.
57+
(rsa_rsaes_pkcs1_v15_decrypt(), rsa_rsaes_oaep_decrypt). Found by Laurent
58+
Simon.
5359
* Add exponent blinding to RSA private operations as a countermeasure
5460
against side-channel attacks like the cache attack described in
5561
https://arxiv.org/abs/1702.08719v2.
5662
Found and fix proposed by Michael Schwarz, Samuel Weiser, Daniel Gruss,
5763
Clémentine Maurice and Stefan Mangard.
5864

5965
Features
60-
* Exposed parts of the Elliptic Curve Point internal interface, to provide
61-
interface for external hardware acceleration code.
66+
* Add hardware acceleration support for the Elliptic Curve Point module.
67+
This involved exposing parts of the internal interface to enable
68+
replacing the core functions and adding and alternative, module level
69+
replacement support for enabling the extension of the interface.
6270
* Add a new configuration option to 'mbedtls_ssl_config' to enable
6371
suppressing the CA list in Certificate Request messages. The default
6472
behaviour has not changed, namely every configured CAs name is included.
@@ -74,7 +82,12 @@ API Changes
7482
Bugfix
7583
* Remove macros from compat-1.3.h that correspond to deleted items from most
7684
recent versions of the library. Found by Kyle Keen.
77-
* Fixed issue in mutexes to failing to initialise. #667
85+
* Fixed issue in the Threading module that prevented mutexes from
86+
initialising. Found by sznaider. #667 #843
87+
* Add checks in the PK module for the RSA functions on 64-bit systems.
88+
The PK and RSA modules use different types for passing hash length and
89+
without these checks the type cast could lead to data loss. Found by Guido
90+
Vranken.
7891

7992
= mbed TLS 2.4.2 branch released 2017-03-08
8093

0 commit comments

Comments
 (0)