mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-05-28 16:21:27 +03:00
Prepare ChangeLog for 2.28.5 release
``` ./scripts/assemble_changelog.py ``` Signed-off-by: Minos Galanakis <minos.galanakis@arm.com>
This commit is contained in:
parent
c7a8ea998d
commit
7de3eed636
49
ChangeLog
49
ChangeLog
@ -1,5 +1,54 @@
|
||||
Mbed TLS ChangeLog (Sorted per branch, date)
|
||||
|
||||
= Mbed TLS x.x.x branch released xxxx-xx-xx
|
||||
|
||||
Features
|
||||
* The documentation of mbedtls_ecp_group now describes the optimized
|
||||
representation of A for some curves. Fixes #8045.
|
||||
|
||||
Security
|
||||
* Developers using mbedtls_pkcs5_pbes2() or mbedtls_pkcs12_pbe() should
|
||||
review the size of the output buffer passed to this function, and note
|
||||
that the output after decryption may include CBC padding. Consider moving
|
||||
to the new functions mbedtls_pkcs5_pbes2_ext() or mbedtls_pkcs12_pbe_ext()
|
||||
which checks for overflow of the output buffer and reports the actual
|
||||
length of the output.
|
||||
* Improve padding calculations in CBC decryption, NIST key unwrapping and
|
||||
RSA OAEP decryption. With the previous implementation, some compilers
|
||||
(notably recent versions of Clang and IAR) could produce non-constant
|
||||
time code, which could allow a padding oracle attack if the attacker
|
||||
has access to precise timing measurements.
|
||||
* Fix a buffer overread when parsing short TLS application data records in
|
||||
ARC4 or null-cipher cipher suites. Credit to OSS-Fuzz.
|
||||
|
||||
Bugfix
|
||||
* Fix x509 certificate generation to conform to RFC 5480 / RFC 5758 when
|
||||
using ECC key. The certificate was rejected by some crypto frameworks.
|
||||
Fixes #2924.
|
||||
* Fix some cases where mbedtls_mpi_mod_exp, RSA key construction or ECDSA
|
||||
signature can silently return an incorrect result in low memory conditions.
|
||||
* Fix IAR compiler warnings. Fixes #7873, #4300.
|
||||
* Fix an issue when parsing an otherName subject alternative name into a
|
||||
mbedtls_x509_san_other_name struct. The type-id of the otherName was not
|
||||
copied to the struct. This meant that the struct had incomplete
|
||||
information about the otherName SAN and contained uninitialized memory.
|
||||
* Fix the detection of HardwareModuleName otherName SANs. These were being
|
||||
detected by comparing the wrong field and the check was erroneously
|
||||
inverted.
|
||||
* Fix an error when MBEDTLS_ECDSA_SIGN_ALT is defined but not
|
||||
MBEDTLS_ECDSA_VERIFY_ALT, causing ecdsa verify to fail. Fixes #7498.
|
||||
* Functions in the ssl_cache module now return a negative MBEDTLS_ERR_xxx
|
||||
error code on failure. Before, they returned 1 to indicate failure in
|
||||
some cases involving a missing entry or a full cache.
|
||||
|
||||
Changes
|
||||
* In configurations with ARIA or Camellia but not AES, the value of
|
||||
MBEDTLS_CIPHER_BLKSIZE_MAX was 8, rather than 16 as the name might
|
||||
suggest. This did not affect any library code, because this macro was
|
||||
only used in relation with CMAC which does not support these ciphers.
|
||||
Its value is now 16 if ARIA or Camellia are present. This may affect
|
||||
application code that uses this macro.
|
||||
|
||||
= Mbed TLS 2.28.4 branch released 2023-08-04
|
||||
|
||||
Features
|
||||
|
@ -1,7 +0,0 @@
|
||||
Changes
|
||||
* In configurations with ARIA or Camellia but not AES, the value of
|
||||
MBEDTLS_CIPHER_BLKSIZE_MAX was 8, rather than 16 as the name might
|
||||
suggest. This did not affect any library code, because this macro was
|
||||
only used in relation with CMAC which does not support these ciphers.
|
||||
Its value is now 16 if ARIA or Camellia are present. This may affect
|
||||
application code that uses this macro.
|
@ -1,4 +0,0 @@
|
||||
Bugfix
|
||||
* Functions in the ssl_cache module now return a negative MBEDTLS_ERR_xxx
|
||||
error code on failure. Before, they returned 1 to indicate failure in
|
||||
some cases involving a missing entry or a full cache.
|
@ -1,7 +0,0 @@
|
||||
Security
|
||||
* Developers using mbedtls_pkcs5_pbes2() or mbedtls_pkcs12_pbe() should
|
||||
review the size of the output buffer passed to this function, and note
|
||||
that the output after decryption may include CBC padding. Consider moving
|
||||
to the new functions mbedtls_pkcs5_pbes2_ext() or mbedtls_pkcs12_pbe_ext()
|
||||
which checks for overflow of the output buffer and reports the actual
|
||||
length of the output.
|
@ -1,3 +0,0 @@
|
||||
Bugfix
|
||||
* Fix some cases where mbedtls_mpi_mod_exp, RSA key construction or ECDSA
|
||||
signature can silently return an incorrect result in low memory conditions.
|
@ -1,2 +0,0 @@
|
||||
Bugfix
|
||||
* Fix IAR compiler warnings. Fixes #7873, #4300.
|
@ -1,3 +0,0 @@
|
||||
Features
|
||||
* The documentation of mbedtls_ecp_group now describes the optimized
|
||||
representation of A for some curves. Fixes #8045.
|
@ -1,8 +0,0 @@
|
||||
Bugfix
|
||||
* Fix an issue when parsing an otherName subject alternative name into a
|
||||
mbedtls_x509_san_other_name struct. The type-id of the otherName was not
|
||||
copied to the struct. This meant that the struct had incomplete
|
||||
information about the otherName SAN and contained uninitialized memory.
|
||||
* Fix the detection of HardwareModuleName otherName SANs. These were being
|
||||
detected by comparing the wrong field and the check was erroneously
|
||||
inverted.
|
@ -1,3 +0,0 @@
|
||||
Bugfix
|
||||
* Fix an error when MBEDTLS_ECDSA_SIGN_ALT is defined but not
|
||||
MBEDTLS_ECDSA_VERIFY_ALT, causing ecdsa verify to fail. Fixes #7498.
|
@ -1,6 +0,0 @@
|
||||
Security
|
||||
* Improve padding calculations in CBC decryption, NIST key unwrapping and
|
||||
RSA OAEP decryption. With the previous implementation, some compilers
|
||||
(notably recent versions of Clang and IAR) could produce non-constant
|
||||
time code, which could allow a padding oracle attack if the attacker
|
||||
has access to precise timing measurements.
|
@ -1,3 +0,0 @@
|
||||
Security
|
||||
* Fix a buffer overread when parsing short TLS application data records in
|
||||
ARC4 or null-cipher cipher suites. Credit to OSS-Fuzz.
|
@ -1,4 +0,0 @@
|
||||
Bugfix
|
||||
* Fix x509 certificate generation to conform to RFC 5480 / RFC 5758 when
|
||||
using ECC key. The certificate was rejected by some crypto frameworks.
|
||||
Fixes #2924.
|
Loading…
x
Reference in New Issue
Block a user