CHANGELOG.md (026587490746caba523909998b442a2ae1c06bb5) | CHANGELOG.md (72cf8859b1e1fd6d954b0d294cc004d0375f8055) |
---|---|
1# Change Log 2All notable changes to this project will be documented in this file. 3 4The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/) 5and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html). 6 7--- 8 --- 14 unchanged lines hidden (view full) --- 23- HCI: update advertising data without stopping advertising first 24- GAP: Drop local bonding flag in IO Capability Reply if remote does not indicate bonding 25- GAP: return status for `gap_set_security_mode` 26- GAP: abort legacy pairing if Level 4 is required 27- GAP: abort SSP on IO Capabilities Request event if Level 4 is required but SC not supported by remote 28- GAP: abort SSP on User Confirmation Request event if Level 3 is required but MITM protection not possible 29- GAP: validate minimal service security level can be reached during pairing in responder role 30- L2CAP: don't trigger hci disconnect if l2cap security requirements are insufficient | 1# Change Log 2All notable changes to this project will be documented in this file. 3 4The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/) 5and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html). 6 7--- 8 --- 14 unchanged lines hidden (view full) --- 23- HCI: update advertising data without stopping advertising first 24- GAP: Drop local bonding flag in IO Capability Reply if remote does not indicate bonding 25- GAP: return status for `gap_set_security_mode` 26- GAP: abort legacy pairing if Level 4 is required 27- GAP: abort SSP on IO Capabilities Request event if Level 4 is required but SC not supported by remote 28- GAP: abort SSP on User Confirmation Request event if Level 3 is required but MITM protection not possible 29- GAP: validate minimal service security level can be reached during pairing in responder role 30- L2CAP: don't trigger hci disconnect if l2cap security requirements are insufficient |
31- CVE-2020-26555: reject connections to and from devices with same BD ADDR |
|
31- CVE-2020-26558: abort LE Secure Connection pairing if remote uses the same public key 32 33## Release v1.4 34 35### Added 36- HCI: `btstack_transport_sco.h` supports SCO over physical PCM/I2S interface (`HAVE_SCO_TRANSPORT`) 37- POSIX: `btstack_transport_sco_i2s_test_bridge.c` implements SCO transport interface for UART-to-I2S test bridge 38- btstack_uart: `btstack_uart_t` interface extends `btstack_uart_block_t`: --- 797 unchanged lines hidden --- | 32- CVE-2020-26558: abort LE Secure Connection pairing if remote uses the same public key 33 34## Release v1.4 35 36### Added 37- HCI: `btstack_transport_sco.h` supports SCO over physical PCM/I2S interface (`HAVE_SCO_TRANSPORT`) 38- POSIX: `btstack_transport_sco_i2s_test_bridge.c` implements SCO transport interface for UART-to-I2S test bridge 39- btstack_uart: `btstack_uart_t` interface extends `btstack_uart_block_t`: --- 797 unchanged lines hidden --- |