mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2026-05-11 06:28:17 +02:00
Merge remote-tracking branch 'mbedtls-restricted/development-restricted' into mbedtls-3.2.0rc0-pr
This commit is contained in:
11
ChangeLog.d/add_mbedtls_setbuf.txt
Normal file
11
ChangeLog.d/add_mbedtls_setbuf.txt
Normal file
@@ -0,0 +1,11 @@
|
||||
Security
|
||||
* Add the platform function mbedtls_setbuf() to allow buffering to be
|
||||
disabled on stdio files, to stop secrets loaded from said files being
|
||||
potentially left in memory after file operations. Reported by
|
||||
Glenn Strauss.
|
||||
Requirement changes
|
||||
* The library will no longer compile out of the box on a platform without
|
||||
setbuf(). If your platform does not have setbuf(), you can configure an
|
||||
alternative function by enabling MBEDTLS_PLATFORM_SETBUF_ALT or
|
||||
MBEDTLS_PLATFORM_SETBUF_MACRO.
|
||||
|
||||
4
ChangeLog.d/bignum-0-mod-2.txt
Normal file
4
ChangeLog.d/bignum-0-mod-2.txt
Normal file
@@ -0,0 +1,4 @@
|
||||
Bugfix
|
||||
* Fix a null pointer dereference when performing some operations on zero
|
||||
represented with 0 limbs (specifically mbedtls_mpi_mod_int() dividing
|
||||
by 2, and mbedtls_mpi_write_string() in base 2).
|
||||
6
ChangeLog.d/buf-overread-use-psa-static-ecdh.txt
Normal file
6
ChangeLog.d/buf-overread-use-psa-static-ecdh.txt
Normal file
@@ -0,0 +1,6 @@
|
||||
Security
|
||||
* Fix a potential heap buffer overread in TLS 1.2 server-side when
|
||||
MBEDTLS_USE_PSA_CRYPTO is enabled, an opaque key (created with
|
||||
mbedtls_pk_setup_opaque()) is provisioned, and a static ECDH ciphersuite
|
||||
is selected. This may result in an application crash or potentially an
|
||||
information leak.
|
||||
9
ChangeLog.d/cookie_parsing_bug.txt
Normal file
9
ChangeLog.d/cookie_parsing_bug.txt
Normal file
@@ -0,0 +1,9 @@
|
||||
Security
|
||||
* Fix a buffer overread in DTLS ClientHello parsing in servers with
|
||||
MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled. An unauthenticated client
|
||||
or a man-in-the-middle could cause a DTLS server to read up to 255 bytes
|
||||
after the end of the SSL input buffer. The buffer overread only happens
|
||||
when MBEDTLS_SSL_IN_CONTENT_LEN is less than a threshold that depends on
|
||||
the exact configuration: 258 bytes if using mbedtls_ssl_cookie_check(),
|
||||
and possibly up to 571 bytes with a custom cookie check function.
|
||||
Reported by the Cybeats PSI Team.
|
||||
4
ChangeLog.d/fix_tls_record_size_check.txt
Normal file
4
ChangeLog.d/fix_tls_record_size_check.txt
Normal file
@@ -0,0 +1,4 @@
|
||||
Bugfix
|
||||
* Fix record sizes larger than 16384 being sometimes accepted despite being
|
||||
non-compliant. This could not lead to a buffer overflow. In particular,
|
||||
application data size was already checked correctly.
|
||||
8
ChangeLog.d/tls13-add-missing-overread-check.txt
Normal file
8
ChangeLog.d/tls13-add-missing-overread-check.txt
Normal file
@@ -0,0 +1,8 @@
|
||||
Security
|
||||
* Fix a buffer overread in TLS 1.3 Certificate parsing. An unauthenticated
|
||||
client or server could cause an MbedTLS server or client to overread up
|
||||
to 64 kBytes of data and potentially overread the input buffer by that
|
||||
amount minus the size of the input buffer. As overread data undergoes
|
||||
various checks, the likelihood of reaching the boundary of the input
|
||||
buffer is rather small but increases as its size
|
||||
MBEDTLS_SSL_IN_CONTENT_LEN decreases.
|
||||
7
ChangeLog.d/tls13-fix-key-usage-checks.txt
Normal file
7
ChangeLog.d/tls13-fix-key-usage-checks.txt
Normal file
@@ -0,0 +1,7 @@
|
||||
Security
|
||||
* Fix check of certificate key usage in TLS 1.3. The usage of the public key
|
||||
provided by a client or server certificate for authentication was not
|
||||
checked properly when validating the certificate. This could cause a
|
||||
client or server to be able to authenticate itself through a certificate
|
||||
to an Mbed TLS TLS 1.3 server or client while it does not own a proper
|
||||
certificate to do so.
|
||||
Reference in New Issue
Block a user