diff options
author | Hauke Mehrtens <hauke@hauke-m.de> | 2022-12-29 21:26:28 +0100 |
---|---|---|
committer | Hauke Mehrtens <hauke@hauke-m.de> | 2022-12-31 14:45:23 +0100 |
commit | 158a33591d5d4baeb5b09f7c2eec9b5a0b8db609 (patch) | |
tree | 0912d6d6f72b74208c55a09d5f661511f2d11e51 /package/libs/wolfssl/Makefile | |
parent | b23cab2fcfe893f860018013feb591395c5c32b0 (diff) | |
download | upstream-158a33591d5d4baeb5b09f7c2eec9b5a0b8db609.tar.gz upstream-158a33591d5d4baeb5b09f7c2eec9b5a0b8db609.tar.bz2 upstream-158a33591d5d4baeb5b09f7c2eec9b5a0b8db609.zip |
mbedtls: update to version 2.28.2
Changelog: https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2
This release of Mbed TLS provides bug fixes and minor enhancements. This
release includes fixes for security issues.
Fixes the following CVEs:
* CVE-2022-46393: Fix potential heap buffer overread and overwrite in
DTLS if MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and
MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.
* CVE-2022-46392: An adversary with access to precise enough information
about memory accesses (typically, an untrusted operating system
attacking a secure enclave) could recover an RSA private key after
observing the victim performing a single private-key operation if the
window size used for the exponentiation was 3 or smaller.
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
(cherry picked from commit af3c9b74e177019b18055c263099a42c1c6c3453)
Diffstat (limited to 'package/libs/wolfssl/Makefile')
0 files changed, 0 insertions, 0 deletions