From mboxrd@z Thu Jan 1 00:00:00 1970 From: Yann E. MORIN Date: Sun, 23 Feb 2020 09:28:31 +0100 Subject: [Buildroot] [PATCH 1/1] package/mbedtls: security bump to version 2.16.5 In-Reply-To: <20200221215646.295828-1-fontaine.fabrice@gmail.com> References: <20200221215646.295828-1-fontaine.fabrice@gmail.com> Message-ID: <20200223082831.GG8743@scaer> List-Id: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: buildroot@busybox.net Fabrice, All, On 2020-02-21 22:56 +0100, Fabrice Fontaine spake thusly: > - Fix potential memory overread when performing an ECDSA signature > operation. The overread only happens with cryptographically low > probability (of the order of 2^-n where n is the bitsize of the > curve) unless the RNG is broken, and could result in information > disclosure or denial of service (application crash or extra resource > consumption). > - To avoid a side channel vulnerability when parsing an RSA private > key, read all the CRT parameters from the DER structure rather than > reconstructing them. > - Update indentation of hash file (two spaces) > > Signed-off-by: Fabrice Fontaine Applied to master, thanks. Regards, Yann E. MORIN. > --- > package/mbedtls/mbedtls.hash | 8 ++++---- > package/mbedtls/mbedtls.mk | 2 +- > 2 files changed, 5 insertions(+), 5 deletions(-) > > diff --git a/package/mbedtls/mbedtls.hash b/package/mbedtls/mbedtls.hash > index db9d29d1d5..92e7d35a64 100644 > --- a/package/mbedtls/mbedtls.hash > +++ b/package/mbedtls/mbedtls.hash > @@ -1,5 +1,5 @@ > -# From https://tls.mbed.org/tech-updates/releases/mbedtls-2.16.4-and-2.7.13-released > -sha1 e446cbac7d24fc3ff1b1c4ee7c021694ede86db6 mbedtls-2.16.4-apache.tgz > -sha256 3441f32bda9c8ef58acc9e18028d09eb9c17d199eb27141bec074905152fb2fb mbedtls-2.16.4-apache.tgz > +# From https://tls.mbed.org/tech-updates/releases/mbedtls-2.16.5-and-2.7.14-released > +sha1 c36962183e05467aa1dadafcaacf90216a737866 mbedtls-2.16.5-apache.tgz > +sha256 65b4c6cec83e048fd1c675e9a29a394ea30ad0371d37b5742453f74084e7b04d mbedtls-2.16.5-apache.tgz > # Locally calculated > -sha256 cfc7749b96f63bd31c3c42b5c471bf756814053e847c10f3eb003417bc523d30 apache-2.0.txt > +sha256 cfc7749b96f63bd31c3c42b5c471bf756814053e847c10f3eb003417bc523d30 apache-2.0.txt > diff --git a/package/mbedtls/mbedtls.mk b/package/mbedtls/mbedtls.mk > index c6a7adc72a..5d0dd87339 100644 > --- a/package/mbedtls/mbedtls.mk > +++ b/package/mbedtls/mbedtls.mk > @@ -5,7 +5,7 @@ > ################################################################################ > > MBEDTLS_SITE = https://tls.mbed.org/code/releases > -MBEDTLS_VERSION = 2.16.4 > +MBEDTLS_VERSION = 2.16.5 > MBEDTLS_SOURCE = mbedtls-$(MBEDTLS_VERSION)-apache.tgz > MBEDTLS_CONF_OPTS = \ > -DENABLE_PROGRAMS=$(if $(BR2_PACKAGE_MBEDTLS_PROGRAMS),ON,OFF) \ > -- > 2.25.0 > > _______________________________________________ > buildroot mailing list > buildroot at busybox.net > http://lists.busybox.net/mailman/listinfo/buildroot -- .-----------------.--------------------.------------------.--------------------. | Yann E. MORIN | Real-Time Embedded | /"\ ASCII RIBBON | Erics' conspiracy: | | +33 662 376 056 | Software Designer | \ / CAMPAIGN | ___ | | +33 561 099 427 `------------.-------: X AGAINST | \e/ There is no | | http://ymorin.is-a-geek.org/ | _/*\_ | / \ HTML MAIL | v conspiracy. | '------------------------------^-------^------------------^--------------------'