mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-22 11:45:42 +01:00
Updated version number to 2.4.2 for release
This commit is contained in:
parent
f8c45eb61a
commit
b65c2be5f1
@ -1,8 +1,13 @@
|
|||||||
mbed TLS ChangeLog (Sorted per branch, date)
|
mbed TLS ChangeLog (Sorted per branch, date)
|
||||||
|
|
||||||
= mbed TLS 2.x.x branch released xxxx-xx-xx
|
= mbed TLS 2.4.2 branch released 2017-03-08
|
||||||
|
|
||||||
Security
|
Security
|
||||||
|
* Add checks to prevent signature forgeries for very large messages while
|
||||||
|
using RSA through the PK module in 64-bit systems. The issue was caused by
|
||||||
|
some data loss when casting a size_t to an unsigned int value in the
|
||||||
|
functions rsa_verify_wrap(), rsa_sign_wrap(), rsa_alt_sign_wrap() and
|
||||||
|
mbedtls_pk_sign(). Found by Jean-Philippe Aumasson.
|
||||||
* Fixed potential livelock during the parsing of a CRL in PEM format in
|
* Fixed potential livelock during the parsing of a CRL in PEM format in
|
||||||
mbedtls_x509_crl_parse(). A string containing a CRL followed by trailing
|
mbedtls_x509_crl_parse(). A string containing a CRL followed by trailing
|
||||||
characters after the footer could result in the execution of an infinite
|
characters after the footer could result in the execution of an infinite
|
||||||
|
Loading…
Reference in New Issue
Block a user