mirror of
https://github.com/cuberite/polarssl.git
synced 2025-09-08 23:03:06 -04:00
Update ChangeLog to make "fix" explicit
Signed-off-by: Tom Cosgrove <tom.cosgrove@arm.com>
This commit is contained in:
parent
40d79cef35
commit
fc09b75023
29
ChangeLog
29
ChangeLog
@ -6,11 +6,11 @@ Security
|
|||||||
* Fix potential heap buffer overread and overwrite in DTLS if
|
* Fix potential heap buffer overread and overwrite in DTLS if
|
||||||
MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and
|
MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and
|
||||||
MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.
|
MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.
|
||||||
* An adversary with access to precise enough information about memory
|
* Fix an issue where an adversary with access to precise enough information
|
||||||
accesses (typically, an untrusted operating system attacking a secure
|
about memory accesses (typically, an untrusted operating system attacking
|
||||||
enclave) could recover an RSA private key after observing the victim
|
a secure enclave) could recover an RSA private key after observing the
|
||||||
performing a single private-key operation if the window size used for the
|
victim performing a single private-key operation if the window size used
|
||||||
exponentiation was 3 or smaller. Found and reported by Zili KOU,
|
for the exponentiation was 3 or smaller. Found and reported by Zili KOU,
|
||||||
Wenjian HE, Sharad Sinha, and Wei ZHANG. See "Cache Side-channel Attacks
|
Wenjian HE, Sharad Sinha, and Wei ZHANG. See "Cache Side-channel Attacks
|
||||||
and Defenses of the Sliding Window Algorithm in TEEs" - Design, Automation
|
and Defenses of the Sliding Window Algorithm in TEEs" - Design, Automation
|
||||||
and Test in Europe 2023.
|
and Test in Europe 2023.
|
||||||
@ -337,16 +337,17 @@ Security
|
|||||||
* It was possible to configure MBEDTLS_ECP_MAX_BITS to a value that is
|
* It was possible to configure MBEDTLS_ECP_MAX_BITS to a value that is
|
||||||
too small, leading to buffer overflows in ECC operations. Fail the build
|
too small, leading to buffer overflows in ECC operations. Fail the build
|
||||||
in such a case.
|
in such a case.
|
||||||
* An adversary with access to precise enough information about memory
|
* Fix an issue where an adversary with access to precise enough information
|
||||||
accesses (typically, an untrusted operating system attacking a secure
|
about memory accesses (typically, an untrusted operating system attacking
|
||||||
enclave) could recover an RSA private key after observing the victim
|
a secure enclave) could recover an RSA private key after observing the
|
||||||
performing a single private-key operation. Found and reported by
|
victim performing a single private-key operation. Found and reported by
|
||||||
Zili KOU, Wenjian HE, Sharad Sinha, and Wei ZHANG.
|
Zili KOU, Wenjian HE, Sharad Sinha, and Wei ZHANG.
|
||||||
* An adversary with access to precise enough timing information (typically, a
|
* Fix an issue where an adversary with access to precise enough timing
|
||||||
co-located process) could recover a Curve25519 or Curve448 static ECDH key
|
information (typically, a co-located process) could recover a Curve25519
|
||||||
after inputting a chosen public key and observing the victim performing the
|
or Curve448 static ECDH key after inputting a chosen public key and
|
||||||
corresponding private-key operation. Found and reported by Leila Batina,
|
observing the victim performing the corresponding private-key operation.
|
||||||
Lukas Chmielewski, Björn Haase, Niels Samwel and Peter Schwabe.
|
Found and reported by Leila Batina, Lukas Chmielewski, Björn Haase, Niels
|
||||||
|
Samwel and Peter Schwabe.
|
||||||
|
|
||||||
Bugfix
|
Bugfix
|
||||||
* Add printf function attributes to mbedtls_debug_print_msg to ensure we
|
* Add printf function attributes to mbedtls_debug_print_msg to ensure we
|
||||||
|
Loading…
x
Reference in New Issue
Block a user