Release Notes

30 Enhancements and Resolved Issues
RSA BSAFE Crypto-C Micro Edition 4.1.4 Release Notes
Enhancements and Resolved Issues
The following table lists the enhancements and resolved issues in this release of
Crypto-C ME.
Table 8 Enhancements and Resolved Issues
ID Description
BSFCRYCME-2003 AIX FIPS shared libraries include search paths.
BSFCRYCME-1985 New Bleichenbacher type side-channel attacks against RSA PKCS
#1 v1.5 padding - CVE-2019-3731.
BSFCRYCME-1982 Unsafe memory access when processing DSA signatures -
CVE-2019-3728.
BSFCRYCME-1957 PKCS1 (un)padding leaves a copy of plain text in memory -
CVE-2019-3733.
BSFCRYCME-1934 Add CPU option controls for ARMv8.
BSFCRYCME-1913 Add support for HKDF.
BSFCRYCME-1895 Add an API to retrieve the current FIPS-mode.
BSFCRYCME-1892 Make entropy source resource identifiers public.
BSFCRYCME-1874
R_TIME_import() can calculate the wrong UTC times for 32-bit
builds on AIX 6.1/7.1
BSFCRYCME-1852 Crypto-C ME is vulnerable to PKCS #1 unpadding timing side
channel attack - CVE-2019-3732.
BSFCRYCME-1832 The callback memory allocator fails when allocating zero bytes.
BSFCRYCME-1827 Add Spectre mitigation flags to Windows 2017 build.
BSFCRYCME-1831 Add support for windows code signing.
BSFCRYCME-1821 Enforce minimum strength for all asymmetric key operations.
BSFCRYCME-1819 Migrate to Xcode 9 for iOS.
BSFCRYCME-1814 Add SHA-3 digest.
BSFCRYCME-1812
Ri_CRYPTO_INFO map entries are not zeroized on free -
CVE-2019-3733.
BSFCRYCME-1810 R_CR info-map items not zeroized - CVE-2019-3733.
BSFCRYCME-1809 Implement PWRI KEK key wrap.
BSFCRYCME-1734 Incorrect SHA-512/256 hash algorithm identifier value in X9.31
RSA testing.