Files
mbedtls/ChangeLog.d
Gilles Peskine 3008dde386 Changelog for the fix to mbedtls_mpi_exp_mod(A=0)
In Mbed TLS 2.26.0, the bug was hard to trigger, since all methods for
parsing a bignum (mbedtls_mpi_read_xxx functions) constructed an mbedtls_mpi
object with at least one limb.

In the development branch, after the commit
"New internal function mbedtls_mpi_resize_clear", this bug could be
triggered by a TLS server, by passing invalid custom Diffie-Hellman
parameters with G=0 transmitted as a 0-length byte string.

Since the behavior change in mbedtls_mpi_read_binary and
mbedtls_mpi_read_binary_le (constructing 0 limbs instead of 1 when passed
empty input) turned out to have consequences despite being in principle an
internal detail, mention it in the changelog.

Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2021-06-22 12:44:05 +02:00
..
2021-06-01 09:40:53 +02:00
2021-05-12 14:36:24 -04:00
2021-06-16 11:22:53 +02:00
2021-06-07 12:00:04 +02:00
2021-05-27 17:34:14 +02:00
2021-06-09 13:31:42 +02:00
2021-05-26 13:36:40 +02:00
2021-06-21 09:58:10 +02:00
2021-06-20 23:14:36 +02:00
2021-04-27 17:20:56 +01:00