Mbed TLS 2.1.18
·
28729 commits
to development
since this release
Description
Mbed TLS 2.1.18 is a maintenance release, and contains no new features. This release addresses multiple defects.
End of life for Mbed TLS 2.1
Mbed TLS 2.1.0 was first shipped on 4th September 2015, and has come to the end of its life. This is the last release of the 2.1 branch.
All users of Mbed TLS 2.1 are now advised to upgrade to a later version of Mbed TLS wherever possible. There will now be no further releases of Mbed TLS 2.1.
Bugfix
- Fix for Clang, which was reporting a warning for the bignum.c inline assembly for AMD64 targets creating string literals greater than those permitted by the ISO C99 standard. Found by Aaron Jones. Fixes #482.
- Fix runtime error in
mbedtls_platform_entropy_poll()
when run through qemu user emulation. Reported and fix suggested by randombit. Fixes #1212. - Fix an unsafe bounds check when restoring an SSL session from a ticket. This could lead to a buffer overflow, but only in case ticket authentication was broken. Reported and fix suggested by Guido Vranken in #659.
- Add explicit integer to enumeration type casts to example program
programs/pkey/gen_key
which previously led to compilation failure on some toolchains. Reported by phoenixmcallister. Fixes #2170. - Clarify documentation of
mbedtls_ssl_set_own_cert()
regarding the absence of check for certificate/key matching. Reported by Attila Molnar, #507.
Who should update
We recommend all affected users should update to take advantage of the bug fixes contained in this release at an appropriate point in their development lifecycle.