Hello community,

here is the log from the commit of package mbedtls for openSUSE:Factory checked 
in at 2017-09-13 21:34:45
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/mbedtls (Old)
 and      /work/SRC/openSUSE:Factory/.mbedtls.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "mbedtls"

Wed Sep 13 21:34:45 2017 rev:13 rq:523556 version:2.6.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/mbedtls/mbedtls.changes  2017-07-21 
22:37:15.863435400 +0200
+++ /work/SRC/openSUSE:Factory/.mbedtls.new/mbedtls.changes     2017-09-13 
21:34:48.140481985 +0200
@@ -1,0 +2,33 @@
+Mon Sep 11 21:03:15 UTC 2017 - [email protected]
+
+-  Update to version 2.6.0:
+  * Add the functions mbedtls_platform_setup() and mbedtls_platform_teardown()
+    and the context struct mbedtls_platform_context to perform
+    platform-specific setup and teardown operations. The macro
+    MBEDTLS_PLATFORM_SETUP_TEARDOWN_ALT allows the functions to be overridden
+    by the user in a platform_alt.h file. These new functions are required in
+    some embedded environments to provide a means of initialising underlying
+    cryptographic acceleration hardware.
+  * Reverted API/ABI breaking changes introduced in mbed TLS 2.5.1, to make the
+    API consistent with mbed TLS 2.5.0. Specifically removed the inline
+    qualifier from the functions mbedtls_aes_decrypt, mbedtls_aes_encrypt,
+    mbedtls_ssl_ciphersuite_uses_ec and mbedtls_ssl_ciphersuite_uses_psk. Found
+    by James Cowgill. #978
+  * Certificate verification functions now set flags to -1 in case the full
+    chain was not verified due to an internal error (including in the verify
+    callback) or chain length limitations.
+  * With authmode set to optional, the TLS handshake is now aborted if the
+    verification of the peer's certificate failed due to an overlong chain or
+    a fatal error in the verify callback.
+  * Fix authentication bypass in SSL/TLS: when authmode is set to optional,
+    mbedtls_ssl_get_verify_result() would incorrectly return 0 when the peer's
+    X.509 certificate chain had more than MBEDTLS_X509_MAX_INTERMEDIATE_CA
+    (default: 8) intermediates, even when it was not trusted. This could be
+    triggered remotely from either side. (With authmode set to 'required'
+    (the default), the handshake was correctly aborted).
+    Fix for CVE-2017-14032 and boo#1056544.
+  * Reliably wipe sensitive data after use in the AES example applications
+    programs/aes/aescrypt2 and programs/aes/crypt_and_hash.
+    Found by Laurent Simon.
+
+-------------------------------------------------------------------

Old:
----
  mbedtls-2.5.1-apache.tgz

New:
----
  mbedtls-2.6.0-apache.tgz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ mbedtls.spec ++++++
--- /var/tmp/diff_new_pack.E5WUC8/_old  2017-09-13 21:34:48.940369442 +0200
+++ /var/tmp/diff_new_pack.E5WUC8/_new  2017-09-13 21:34:48.940369442 +0200
@@ -20,7 +20,7 @@
 %define lib_crypto libmbedcrypto0
 %define lib_x509   libmbedx509-0
 Name:           mbedtls
-Version:        2.5.1
+Version:        2.6.0
 Release:        0
 Summary:        Libraries for crypto and SSL/TLS protocols
 License:        Apache-2.0

++++++ mbedtls-2.5.1-apache.tgz -> mbedtls-2.6.0-apache.tgz ++++++
++++ 5909 lines of diff (skipped)


Reply via email to