mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-03-04 13:13:31 +00:00
Fix some Changelog typos
Signed-off-by: Minos Galanakis <minos.galanakis@arm.com>
This commit is contained in:
parent
4492dbd286
commit
8d94aec75c
@ -155,7 +155,7 @@ Security
|
||||
copying may be disabled by setting MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS.
|
||||
Note that setting this option will cause input-output buffer overlap to
|
||||
be only partially supported (#3266).
|
||||
Fixes CVE-2024-28960
|
||||
Fixes CVE-2024-28960.
|
||||
* Restore the maximum TLS version to be negotiated to the configured one
|
||||
when an SSL context is reset with the mbedtls_ssl_session_reset() API.
|
||||
An attacker was able to prevent an Mbed TLS server from establishing any
|
||||
@ -221,7 +221,7 @@ Bugfix
|
||||
* In TLS 1.3 clients, fix an interoperability problem due to the client
|
||||
generating a new random after a HelloRetryRequest. Fixes #8669.
|
||||
* Fix the restoration of the ALPN when loading serialized connection with
|
||||
* the mbedtls_ssl_context_load() API.
|
||||
the mbedtls_ssl_context_load() API.
|
||||
* Fix NULL pointer dereference in mbedtls_pk_verify_ext() when called using
|
||||
an opaque RSA context and specifying MBEDTLS_PK_RSASSA_PSS as key type.
|
||||
* Fix RSA opaque keys always using PKCS1 v1.5 algorithms instead of the
|
||||
|
Loading…
x
Reference in New Issue
Block a user