aboutsummaryrefslogtreecommitdiffstats
path: root/scripts/dump-target-info.pl
diff options
context:
space:
mode:
authorHauke Mehrtens <hauke@hauke-m.de>2022-12-29 21:26:28 +0100
committerHauke Mehrtens <hauke@hauke-m.de>2022-12-31 03:19:58 +0100
commitaf3c9b74e177019b18055c263099a42c1c6c3453 (patch)
tree71d266bdfcca2d7d84ec39d3858f3137a1cae561 /scripts/dump-target-info.pl
parent12fdb4c9f41281da7753818ea4ce54d9a4ed8984 (diff)
downloadupstream-af3c9b74e177019b18055c263099a42c1c6c3453.tar.gz
upstream-af3c9b74e177019b18055c263099a42c1c6c3453.tar.bz2
upstream-af3c9b74e177019b18055c263099a42c1c6c3453.zip
mbedtls: update to version 2.28.2
Changelog: https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2 This release of Mbed TLS provides bug fixes and minor enhancements. This release includes fixes for security issues. Fixes the following CVEs: * CVE-2022-46393: Fix potential heap buffer overread and overwrite in DTLS if MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX. * CVE-2022-46392: An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) could recover an RSA private key after observing the victim performing a single private-key operation if the window size used for the exponentiation was 3 or smaller. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Diffstat (limited to 'scripts/dump-target-info.pl')
0 files changed, 0 insertions, 0 deletions