From e0c6f804030762aa5ee427b1bae99dc91164110e Mon Sep 17 00:00:00 2001 From: Elena Uziunaite Date: Thu, 22 Aug 2024 09:00:57 +0100 Subject: [PATCH] Tiny fix in ChangeLog Signed-off-by: Elena Uziunaite --- ChangeLog.d/fix_reporting_of_key_usage_issues.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ChangeLog.d/fix_reporting_of_key_usage_issues.txt b/ChangeLog.d/fix_reporting_of_key_usage_issues.txt index 75fbb6cc1..08a0ab270 100644 --- a/ChangeLog.d/fix_reporting_of_key_usage_issues.txt +++ b/ChangeLog.d/fix_reporting_of_key_usage_issues.txt @@ -1,7 +1,7 @@ Security * With TLS 1.3, when a server enables optional authentication of the client, if the client-provided certificate does not have appropriate values - in if keyUsage or extKeyUsage extensions, then the return value of + in keyUsage or extKeyUsage extensions, then the return value of mbedtls_ssl_get_verify_result() would incorrectly have the MBEDTLS_X509_BADCERT_KEY_USAGE and MBEDTLS_X509_BADCERT_KEY_USAGE bits clear. As a result, an attacker that had a certificate valid for uses other