You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ChangeLog.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ NOTE: This release switches the default ASN.1 parser to the new ASN template cod
12
12
13
13
14
14
## Vulnerabilities
15
-
*[High]CVE-2024-0901 Potential denial of service and out of bounds read. Affects TLS 1.3 on the server side when connecting to a malicious TLS 1.3 client. If using TLS 1.3 on the server side it is recommended to update the version of wolfSSL used. Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7099
15
+
*[High]CVE-2024-0901 Potential denial of service and out of bounds read. Affects TLS 1.3 on the server side when accepting a connection from a malicious TLS 1.3 client. If using TLS 1.3 on the server side it is recommended to update the version of wolfSSL used. Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7099
16
16
17
17
18
18
*[Med]CVE-2024-1545 Fault Injection vulnerability in RsaPrivateDecryption function that potentially allows an attacker that has access to the same system with a victims process to perform a Rowhammer fault injection. Thanks to Junkai Liang, Zhi Zhang, Xin Zhang, Qingni Shen for the report (Peking University, The University of Western Australia)."
@@ -25,7 +25,7 @@ Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7212
25
25
26
26
## New Feature Additions
27
27
28
-
* Added --enable-experimental configure flag to gate out features that are considered to be experimental. Now liboqs, kyber, lms, xmss, and dual-alg-certs require the --enable-experimental flag.
28
+
* Added --enable-experimental configure flag to gate out features that are currently experimental. Now liboqs, kyber, lms, xmss, and dual-alg-certs require the --enable-experimental flag.
29
29
30
30
### POST QUANTUM SUPPORT ADDITIONS
31
31
* Experimental framework for using wolfSSL’s XMSS implementation (PR 7161)
@@ -76,7 +76,7 @@ Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7212
76
76
* Fix for checking result of MAC verify when no AAD is used with AES-GCM and Xilinx Xilsecure (PR 7051)
77
77
* Fix for Aria sign use (PR 7082)
78
78
* Fix for invalid `dh_ffdhe_test` test case using Intel QuickAssist (PR 7085)
79
-
*Fixes for TI AES and SHA on TM4C with HW acceleration and add full AES GCM and CCM support with TLS (PR 7018)
79
+
*Fixes for TI AES and SHA on TM4C with HW acceleration and add full AES GCM and CCM support with TLS (PR 7018)
80
80
* Fixes for STM32 PKA use with ECC (PR 7098)
81
81
* Fixes for TLS 1.3 with crypto callbacks to offload KDF / HMAC operation (PR 7070)
82
82
* Fix include path for FSP 3.5 on Renesas RA6M4 (PR 7101)
Copy file name to clipboardExpand all lines: README
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -84,7 +84,7 @@ NOTE: This release switches the default ASN.1 parser to the new ASN template cod
84
84
85
85
86
86
## Vulnerabilities
87
-
* [High] CVE-2024-0901 Potential denial of service and out of bounds read. Affects TLS 1.3 on the server side when connecting to a malicious TLS 1.3 client. If using TLS 1.3 on the server side it is recommended to update the version of wolfSSL used. Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7099
87
+
* [High] CVE-2024-0901 Potential denial of service and out of bounds read. Affects TLS 1.3 on the server side when accepting a connection from a malicious TLS 1.3 client. If using TLS 1.3 on the server side it is recommended to update the version of wolfSSL used. Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7099
88
88
89
89
90
90
* [Med] CVE-2024-1545 Fault Injection vulnerability in RsaPrivateDecryption function that potentially allows an attacker that has access to the same system with a victims process to perform a Rowhammer fault injection. Thanks to Junkai Liang, Zhi Zhang, Xin Zhang, Qingni Shen for the report (Peking University, The University of Western Australia)."
@@ -97,7 +97,7 @@ Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7212
97
97
98
98
## New Feature Additions
99
99
100
-
* Added --enable-experimental configure flag to gate out features that are considered to be experimental. Now liboqs, kyber, lms, xmss, and dual-alg-certs require the --enable-experimental flag.
100
+
* Added --enable-experimental configure flag to gate out features that are currently experimental. Now liboqs, kyber, lms, xmss, and dual-alg-certs require the --enable-experimental flag.
101
101
102
102
### POST QUANTUM SUPPORT ADDITIONS
103
103
* Experimental framework for using wolfSSL’s XMSS implementation (PR 7161)
@@ -148,7 +148,7 @@ Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7212
148
148
* Fix for checking result of MAC verify when no AAD is used with AES-GCM and Xilinx Xilsecure (PR 7051)
149
149
* Fix for Aria sign use (PR 7082)
150
150
* Fix for invalid `dh_ffdhe_test` test case using Intel QuickAssist (PR 7085)
151
-
*Fixes for TI AES and SHA on TM4C with HW acceleration and add full AES GCM and CCM support with TLS (PR 7018)
151
+
*Fixes for TI AES and SHA on TM4C with HW acceleration and add full AES GCM and CCM support with TLS (PR 7018)
152
152
* Fixes for STM32 PKA use with ECC (PR 7098)
153
153
* Fixes for TLS 1.3 with crypto callbacks to offload KDF / HMAC operation (PR 7070)
154
154
* Fix include path for FSP 3.5 on Renesas RA6M4 (PR 7101)
Copy file name to clipboardExpand all lines: README.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,7 +88,7 @@ NOTE: In future releases, --enable-des3 (which is disabled by default) will be i
88
88
NOTE: This release switches the default ASN.1 parser to the new ASN template code. If the original ASN.1 code is preferred define `WOLFSSL_ASN_ORIGINAL` to use it. See PR #7199.
89
89
90
90
## Vulnerabilities
91
-
* [High] CVE-2024-0901 Potential denial of service and out of bounds read. Affects TLS 1.3 on the server side when connecting to a malicious TLS 1.3 client. If using TLS 1.3 on the server side it is recommended to update the version of wolfSSL used. Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7099
91
+
* [High] CVE-2024-0901 Potential denial of service and out of bounds read. Affects TLS 1.3 on the server side when accepting a connection from a malicious TLS 1.3 client. If using TLS 1.3 on the server side it is recommended to update the version of wolfSSL used. Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7099
92
92
93
93
94
94
* [Med] CVE-2024-1545 Fault Injection vulnerability in RsaPrivateDecryption function that potentially allows an attacker that has access to the same system with a victims process to perform a Rowhammer fault injection. Thanks to Junkai Liang, Zhi Zhang, Xin Zhang, Qingni Shen for the report (Peking University, The University of Western Australia)."
@@ -101,7 +101,7 @@ Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7212
101
101
102
102
## New Feature Additions
103
103
104
-
* Added --enable-experimental configure flag to gate out features that are considered to be experimental. Now liboqs, kyber, lms, xmss, and dual-alg-certs require the --enable-experimental flag.
104
+
* Added --enable-experimental configure flag to gate out features that are currently experimental. Now liboqs, kyber, lms, xmss, and dual-alg-certs require the --enable-experimental flag.
105
105
106
106
### POST QUANTUM SUPPORT ADDITIONS
107
107
* Experimental framework for using wolfSSL’s XMSS implementation (PR 7161)
@@ -152,7 +152,7 @@ Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7212
152
152
* Fix for checking result of MAC verify when no AAD is used with AES-GCM and Xilinx Xilsecure (PR 7051)
153
153
* Fix for Aria sign use (PR 7082)
154
154
* Fix for invalid `dh_ffdhe_test` test case using Intel QuickAssist (PR 7085)
155
-
*Fixes for TI AES and SHA on TM4C with HW acceleration and add full AES GCM and CCM support with TLS (PR 7018)
155
+
*Fixes for TI AES and SHA on TM4C with HW acceleration and add full AES GCM and CCM support with TLS (PR 7018)
156
156
* Fixes for STM32 PKA use with ECC (PR 7098)
157
157
* Fixes for TLS 1.3 with crypto callbacks to offload KDF / HMAC operation (PR 7070)
158
158
* Fix include path for FSP 3.5 on Renesas RA6M4 (PR 7101)
0 commit comments