Skip to content

Commit 89f040a

Browse files
authored
Merge pull request #978 from Mbed-TLS/mbedtls-2.28.2rc0-pr
Mbedtls 2.28.2rc0 pr [DO NOT MERGE]
2 parents 5c581dd + d6f774f commit 89f040a

27 files changed

+185
-119
lines changed

BRANCHES.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,7 @@ The following branches are currently maintained:
7070
- [master](https://github.com/Mbed-TLS/mbedtls/tree/master)
7171
- [`development`](https://github.com/Mbed-TLS/mbedtls/)
7272
- [`mbedtls-2.28`](https://github.com/Mbed-TLS/mbedtls/tree/mbedtls-2.28)
73-
maintained until at least the end of 2024.
73+
maintained until at least the end of 2024, see
74+
<https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2>.
7475

7576
Users are urged to always use the latest version of a maintained branch.

ChangeLog

Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,74 @@
11
Mbed TLS ChangeLog (Sorted per branch, date)
22

3+
= Mbed TLS 2.28.2 branch released 2022-12-14
4+
5+
Security
6+
* Fix potential heap buffer overread and overwrite in DTLS if
7+
MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and
8+
MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.
9+
* An adversary with access to precise enough information about memory
10+
accesses (typically, an untrusted operating system attacking a secure
11+
enclave) could recover an RSA private key after observing the victim
12+
performing a single private-key operation if the window size used for the
13+
exponentiation was 3 or smaller. Found and reported by Zili KOU,
14+
Wenjian HE, Sharad Sinha, and Wei ZHANG. See "Cache Side-channel Attacks
15+
and Defenses of the Sliding Window Algorithm in TEEs" - Design, Automation
16+
and Test in Europe 2023.
17+
18+
Bugfix
19+
* Fix a long-standing build failure when building x86 PIC code with old
20+
gcc (4.x). The code will be slower, but will compile. We do however
21+
recommend upgrading to a more recent compiler instead. Fixes #1910.
22+
* Fix support for little-endian Microblaze when MBEDTLS_HAVE_ASM is defined.
23+
Contributed by Kazuyuki Kimura to fix #2020.
24+
* Use double quotes to include private header file psa_crypto_cipher.h.
25+
Fixes 'file not found with <angled> include' error
26+
when building with Xcode.
27+
* Fix handling of broken symlinks when loading certificates using
28+
mbedtls_x509_crt_parse_path(). Instead of returning an error as soon as a
29+
broken link is encountered, skip the broken link and continue parsing
30+
other certificate files. Contributed by Eduardo Silva in #2602.
31+
* Fix a compilation error when using CMake with an IAR toolchain.
32+
Fixes #5964.
33+
* Fix bugs and missing dependencies when building and testing
34+
configurations with only one encryption type enabled in TLS 1.2.
35+
* Provide the missing definition of mbedtls_setbuf() in some configurations
36+
with MBEDTLS_PLATFORM_C disabled. Fixes #6118, #6196.
37+
* Fix compilation errors when trying to build with
38+
PSA drivers for AEAD (GCM, CCM, Chacha20-Poly1305).
39+
* Fix memory leak in ssl_parse_certificate_request() caused by
40+
mbedtls_x509_get_name() not freeing allocated objects in case of error.
41+
Change mbedtls_x509_get_name() to clean up allocated objects on error.
42+
* Fix checks on PK in check_config.h for builds with PSA and RSA. This does
43+
not change which builds actually work, only moving a link-time error to
44+
an early check.
45+
* Fix ECDSA verification, where it was not always validating the
46+
public key. This bug meant that it was possible to verify a
47+
signature with an invalid public key, in some cases. Reported by
48+
Guido Vranken using Cryptofuzz in #4420.
49+
* Fix a possible null pointer dereference if a memory allocation fails
50+
in TLS PRF code. Reported by Michael Madsen in #6516.
51+
* Fix a bug in which mbedtls_x509_crt_info() would produce non-printable
52+
bytes when parsing certificates containing a binary RFC 4108
53+
HardwareModuleName as a Subject Alternative Name extension. Hardware
54+
serial numbers are now rendered in hex format. Fixes #6262.
55+
* Fix bug in error reporting in dh_genprime.c where upon failure,
56+
the error code returned by mbedtls_mpi_write_file() is overwritten
57+
and therefore not printed.
58+
* In the bignum module, operations of the form (-A) - (+A) or (-A) - (-A)
59+
with A > 0 created an unintended representation of the value 0 which was
60+
not processed correctly by some bignum operations. Fix this. This had no
61+
consequence on cryptography code, but might affect applications that call
62+
bignum directly and use negative numbers.
63+
* Fix undefined behavior (typically harmless in practice) of
64+
mbedtls_mpi_add_mpi(), mbedtls_mpi_add_abs() and mbedtls_mpi_add_int()
65+
when both operands are 0 and the left operand is represented with 0 limbs.
66+
* Fix undefined behavior (typically harmless in practice) when some bignum
67+
functions receive the most negative value of mbedtls_mpi_sint. Credit
68+
to OSS-Fuzz. Fixes #6597.
69+
* Fix undefined behavior (typically harmless in practice) in PSA ECB
70+
encryption and decryption.
71+
372
= Mbed TLS 2.28.1 branch released 2022-07-11
473

574
Default behavior changes

ChangeLog.d/bn_mul-fix-x86-pic-compilation-for-gcc-4.txt

Lines changed: 0 additions & 4 deletions
This file was deleted.

ChangeLog.d/ecdsa-verify-fixes.txt

Lines changed: 0 additions & 5 deletions
This file was deleted.

ChangeLog.d/fix_aead_psa_driver_build.txt

Lines changed: 0 additions & 3 deletions
This file was deleted.

ChangeLog.d/fix_build_tls1_2_with_single_encryption_type.txt

Lines changed: 0 additions & 3 deletions
This file was deleted.

ChangeLog.d/fix_cmake_using_iar_toolchain.txt

Lines changed: 0 additions & 3 deletions
This file was deleted.

ChangeLog.d/fix_dh_genprime_error_reporting.txt

Lines changed: 0 additions & 4 deletions
This file was deleted.

ChangeLog.d/fix_psa_crypto_cipher_h_include.txt

Lines changed: 0 additions & 4 deletions
This file was deleted.

ChangeLog.d/fix_x509_get_name_mem_leak.txt

Lines changed: 0 additions & 4 deletions
This file was deleted.

0 commit comments

Comments
 (0)