Skip to content

Commit e80deec

Browse files
adjust ChangeLog text
1 parent e5914ef commit e80deec

File tree

3 files changed

+9
-9
lines changed

3 files changed

+9
-9
lines changed

ChangeLog.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ NOTE: This release switches the default ASN.1 parser to the new ASN template cod
1212

1313

1414
## Vulnerabilities
15-
* [High] CVE-2024-0901 Potential denial of service and out of bounds read. Affects TLS 1.3 on the server side when connecting to a malicious TLS 1.3 client. If using TLS 1.3 on the server side it is recommended to update the version of wolfSSL used. Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7099
15+
* [High] CVE-2024-0901 Potential denial of service and out of bounds read. Affects TLS 1.3 on the server side when accepting a connection from a malicious TLS 1.3 client. If using TLS 1.3 on the server side it is recommended to update the version of wolfSSL used. Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7099
1616

1717

1818
* [Med] CVE-2024-1545 Fault Injection vulnerability in RsaPrivateDecryption function that potentially allows an attacker that has access to the same system with a victims process to perform a Rowhammer fault injection. Thanks to Junkai Liang, Zhi Zhang, Xin Zhang, Qingni Shen for the report (Peking University, The University of Western Australia)."
@@ -25,7 +25,7 @@ Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7212
2525

2626
## New Feature Additions
2727

28-
* Added --enable-experimental configure flag to gate out features that are considered to be experimental. Now liboqs, kyber, lms, xmss, and dual-alg-certs require the --enable-experimental flag.
28+
* Added --enable-experimental configure flag to gate out features that are currently experimental. Now liboqs, kyber, lms, xmss, and dual-alg-certs require the --enable-experimental flag.
2929

3030
### POST QUANTUM SUPPORT ADDITIONS
3131
* Experimental framework for using wolfSSL’s XMSS implementation (PR 7161)
@@ -76,7 +76,7 @@ Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7212
7676
* Fix for checking result of MAC verify when no AAD is used with AES-GCM and Xilinx Xilsecure (PR 7051)
7777
* Fix for Aria sign use (PR 7082)
7878
* Fix for invalid `dh_ffdhe_test` test case using Intel QuickAssist (PR 7085)
79-
*Fixes for TI AES and SHA on TM4C with HW acceleration and add full AES GCM and CCM support with TLS (PR 7018)
79+
* Fixes for TI AES and SHA on TM4C with HW acceleration and add full AES GCM and CCM support with TLS (PR 7018)
8080
* Fixes for STM32 PKA use with ECC (PR 7098)
8181
* Fixes for TLS 1.3 with crypto callbacks to offload KDF / HMAC operation (PR 7070)
8282
* Fix include path for FSP 3.5 on Renesas RA6M4 (PR 7101)

README

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ NOTE: This release switches the default ASN.1 parser to the new ASN template cod
8484

8585

8686
## Vulnerabilities
87-
* [High] CVE-2024-0901 Potential denial of service and out of bounds read. Affects TLS 1.3 on the server side when connecting to a malicious TLS 1.3 client. If using TLS 1.3 on the server side it is recommended to update the version of wolfSSL used. Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7099
87+
* [High] CVE-2024-0901 Potential denial of service and out of bounds read. Affects TLS 1.3 on the server side when accepting a connection from a malicious TLS 1.3 client. If using TLS 1.3 on the server side it is recommended to update the version of wolfSSL used. Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7099
8888

8989

9090
* [Med] CVE-2024-1545 Fault Injection vulnerability in RsaPrivateDecryption function that potentially allows an attacker that has access to the same system with a victims process to perform a Rowhammer fault injection. Thanks to Junkai Liang, Zhi Zhang, Xin Zhang, Qingni Shen for the report (Peking University, The University of Western Australia)."
@@ -97,7 +97,7 @@ Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7212
9797

9898
## New Feature Additions
9999

100-
* Added --enable-experimental configure flag to gate out features that are considered to be experimental. Now liboqs, kyber, lms, xmss, and dual-alg-certs require the --enable-experimental flag.
100+
* Added --enable-experimental configure flag to gate out features that are currently experimental. Now liboqs, kyber, lms, xmss, and dual-alg-certs require the --enable-experimental flag.
101101

102102
### POST QUANTUM SUPPORT ADDITIONS
103103
* Experimental framework for using wolfSSL’s XMSS implementation (PR 7161)
@@ -148,7 +148,7 @@ Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7212
148148
* Fix for checking result of MAC verify when no AAD is used with AES-GCM and Xilinx Xilsecure (PR 7051)
149149
* Fix for Aria sign use (PR 7082)
150150
* Fix for invalid `dh_ffdhe_test` test case using Intel QuickAssist (PR 7085)
151-
*Fixes for TI AES and SHA on TM4C with HW acceleration and add full AES GCM and CCM support with TLS (PR 7018)
151+
* Fixes for TI AES and SHA on TM4C with HW acceleration and add full AES GCM and CCM support with TLS (PR 7018)
152152
* Fixes for STM32 PKA use with ECC (PR 7098)
153153
* Fixes for TLS 1.3 with crypto callbacks to offload KDF / HMAC operation (PR 7070)
154154
* Fix include path for FSP 3.5 on Renesas RA6M4 (PR 7101)

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ NOTE: In future releases, --enable-des3 (which is disabled by default) will be i
8888
NOTE: This release switches the default ASN.1 parser to the new ASN template code. If the original ASN.1 code is preferred define `WOLFSSL_ASN_ORIGINAL` to use it. See PR #7199.
8989
9090
## Vulnerabilities
91-
* [High] CVE-2024-0901 Potential denial of service and out of bounds read. Affects TLS 1.3 on the server side when connecting to a malicious TLS 1.3 client. If using TLS 1.3 on the server side it is recommended to update the version of wolfSSL used. Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7099
91+
* [High] CVE-2024-0901 Potential denial of service and out of bounds read. Affects TLS 1.3 on the server side when accepting a connection from a malicious TLS 1.3 client. If using TLS 1.3 on the server side it is recommended to update the version of wolfSSL used. Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7099
9292
9393
9494
* [Med] CVE-2024-1545 Fault Injection vulnerability in RsaPrivateDecryption function that potentially allows an attacker that has access to the same system with a victims process to perform a Rowhammer fault injection. Thanks to Junkai Liang, Zhi Zhang, Xin Zhang, Qingni Shen for the report (Peking University, The University of Western Australia)."
@@ -101,7 +101,7 @@ Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7212
101101
102102
## New Feature Additions
103103
104-
* Added --enable-experimental configure flag to gate out features that are considered to be experimental. Now liboqs, kyber, lms, xmss, and dual-alg-certs require the --enable-experimental flag.
104+
* Added --enable-experimental configure flag to gate out features that are currently experimental. Now liboqs, kyber, lms, xmss, and dual-alg-certs require the --enable-experimental flag.
105105
106106
### POST QUANTUM SUPPORT ADDITIONS
107107
* Experimental framework for using wolfSSL’s XMSS implementation (PR 7161)
@@ -152,7 +152,7 @@ Fixed in this GitHub pull request https://github.com/wolfSSL/wolfssl/pull/7212
152152
* Fix for checking result of MAC verify when no AAD is used with AES-GCM and Xilinx Xilsecure (PR 7051)
153153
* Fix for Aria sign use (PR 7082)
154154
* Fix for invalid `dh_ffdhe_test` test case using Intel QuickAssist (PR 7085)
155-
*Fixes for TI AES and SHA on TM4C with HW acceleration and add full AES GCM and CCM support with TLS (PR 7018)
155+
* Fixes for TI AES and SHA on TM4C with HW acceleration and add full AES GCM and CCM support with TLS (PR 7018)
156156
* Fixes for STM32 PKA use with ECC (PR 7098)
157157
* Fixes for TLS 1.3 with crypto callbacks to offload KDF / HMAC operation (PR 7070)
158158
* Fix include path for FSP 3.5 on Renesas RA6M4 (PR 7101)

0 commit comments

Comments
 (0)