|
1 | 1 | mbed TLS ChangeLog (Sorted per branch, date) |
2 | 2 |
|
| 3 | += mbed TLS 2.4.2 branch released 2017-03-08 |
| 4 | + |
| 5 | +Security |
| 6 | + * Add checks to prevent signature forgeries for very large messages while |
| 7 | + using RSA through the PK module in 64-bit systems. The issue was caused by |
| 8 | + some data loss when casting a size_t to an unsigned int value in the |
| 9 | + functions rsa_verify_wrap(), rsa_sign_wrap(), rsa_alt_sign_wrap() and |
| 10 | + mbedtls_pk_sign(). Found by Jean-Philippe Aumasson. |
| 11 | + * Fixed potential livelock during the parsing of a CRL in PEM format in |
| 12 | + mbedtls_x509_crl_parse(). A string containing a CRL followed by trailing |
| 13 | + characters after the footer could result in the execution of an infinite |
| 14 | + loop. The issue can be triggered remotely. Found by Greg Zaverucha, |
| 15 | + Microsoft. |
| 16 | + * Removed MD5 from the allowed hash algorithms for CertificateRequest and |
| 17 | + CertificateVerify messages, to prevent SLOTH attacks against TLS 1.2. |
| 18 | + Introduced by interoperability fix for #513. |
| 19 | + * Fixed a bug that caused freeing a buffer that was allocated on the stack, |
| 20 | + when verifying the validity of a key on secp224k1. This could be |
| 21 | + triggered remotely for example with a maliciously constructed certificate |
| 22 | + and potentially could lead to remote code execution on some platforms. |
| 23 | + Reported independently by rongsaws and Aleksandar Nikolic, Cisco Talos |
| 24 | + team. #569 CVE-2017-2784 |
| 25 | + |
| 26 | +Bugfix |
| 27 | + * Fix output certificate verification flags set by x509_crt_verify_top() when |
| 28 | + traversing a chain of trusted CA. The issue would cause both flags, |
| 29 | + MBEDTLS_X509_BADCERT_NOT_TRUSTED and MBEDTLS_X509_BADCERT_EXPIRED, to be |
| 30 | + set when the verification conditions are not met regardless of the cause. |
| 31 | + Found by Harm Verhagen and inestlerode. #665 #561 |
| 32 | + * Fix the redefinition of macro ssl_set_bio to an undefined symbol |
| 33 | + mbedtls_ssl_set_bio_timeout in compat-1.3.h, by removing it. |
| 34 | + Found by omlib-lin. #673 |
| 35 | + * Fix unused variable/function compilation warnings in pem.c, x509_crt.c and |
| 36 | + x509_csr.c that are reported when building mbed TLS with a config.h that |
| 37 | + does not define MBEDTLS_PEM_PARSE_C. Found by omnium21. #562 |
| 38 | + * Fix incorrect renegotiation condition in ssl_check_ctr_renegotiate() that |
| 39 | + would compare 64 bits of the record counter instead of 48 bits as indicated |
| 40 | + in RFC 6347 Section 4.3.1. This could cause the execution of the |
| 41 | + renegotiation routines at unexpected times when the protocol is DTLS. Found |
| 42 | + by wariua. #687 |
| 43 | + * Fixed multiple buffer overreads in mbedtls_pem_read_buffer() when parsing |
| 44 | + the input string in PEM format to extract the different components. Found |
| 45 | + by Eyal Itkin. |
| 46 | + * Fixed potential arithmetic overflow in mbedtls_ctr_drbg_reseed() that could |
| 47 | + cause buffer bound checks to be bypassed. Found by Eyal Itkin. |
| 48 | + * Fixed potential arithmetic overflows in mbedtls_cipher_update() that could |
| 49 | + cause buffer bound checks to be bypassed. Found by Eyal Itkin. |
| 50 | + * Fixed potential arithmetic overflow in mbedtls_md2_update() that could |
| 51 | + cause buffer bound checks to be bypassed. Found by Eyal Itkin. |
| 52 | + * Fixed potential arithmetic overflow in mbedtls_base64_decode() that could |
| 53 | + cause buffer bound checks to be bypassed. Found by Eyal Itkin. |
| 54 | + * Fixed heap overreads in mbedtls_x509_get_time(). Found by Peng |
| 55 | + Li/Yueh-Hsun Lin, KNOX Security, Samsung Research America. |
| 56 | + * Fix potential memory leak in mbedtls_x509_crl_parse(). The leak was caused |
| 57 | + by missing calls to mbedtls_pem_free() in cases when a |
| 58 | + MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT error was encountered. Found and |
| 59 | + fix proposed by Guido Vranken. #722 |
| 60 | + * Fixed the templates used to generate project and solution files for Visual |
| 61 | + Studio 2015 as well as the files themselves, to remove a build warning |
| 62 | + generated in Visual Studio 2015. Reported by Steve Valliere. #742 |
| 63 | + * Fix a resource leak in ssl_cookie, when using MBEDTLS_THREADING_C. |
| 64 | + Raised and fix suggested by Alan Gillingham in the mbed TLS forum. #771 |
| 65 | + * Fix 1 byte buffer overflow in mbedtls_mpi_write_string() when the MPI |
| 66 | + number to write in hexadecimal is negative and requires an odd number of |
| 67 | + digits. Found and fixed by Guido Vranken. |
| 68 | + * Fix unlisted DES configuration dependency in some pkparse test cases. Found |
| 69 | + by inestlerode. #555 |
| 70 | + |
| 71 | += mbed TLS 2.4.1 branch released 2016-12-13 |
| 72 | + |
| 73 | +Changes |
| 74 | + * Update to CMAC test data, taken from - NIST Special Publication 800-38B - |
| 75 | + Recommendation for Block Cipher Modes of Operation: The CMAC Mode for |
| 76 | + Authentication – October 2016 |
| 77 | + |
3 | 78 | = mbed TLS 2.4.0 branch released 2016-10-17 |
4 | 79 |
|
5 | 80 | Security |
|
0 commit comments