[Buildroot] [PATCH 1/1] package/mbedtls: security bump to version 2.16.7
Peter Korsgaard
peter at korsgaard.com
Tue Jul 21 20:48:51 UTC 2020
>>>>> "Fabrice" == Fabrice Fontaine <fontaine.fabrice at gmail.com> writes:
> - Fix a side channel vulnerability in modular exponentiation that could
> reveal an RSA private key used in a secure enclave.
> - Fix side channel in mbedtls_ecp_check_pub_priv() and
> mbedtls_pk_parse_key() / mbedtls_pk_parse_keyfile() (when loading a
> private key that didn't include the uncompressed public key), as well
> as mbedtls_ecp_mul() / mbedtls_ecp_mul_restartable() when called with
> a NULL f_rng argument. An attacker with access to precise enough
> timing and memory access information (typically an untrusted operating
> system attacking a secure enclave) could fully recover the ECC private
> key.
> - Fix issue in Lucky 13 counter-measure that could make it ineffective
> when hardware accelerators were used (using one of the
> MBEDTLS_SHAxxx_ALT macros). This would cause the original Lucky 13
> attack to be possible in those configurations, allowing an active
> network attacker to recover plaintext after repeated timing
> measurements under some conditions.
> https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-07
> Switch to github to get latest release
> Signed-off-by: Fabrice Fontaine <fontaine.fabrice at gmail.com>
Committed to 2020.02.x and 2020.05.x, thanks.
--
Bye, Peter Korsgaard
More information about the buildroot
mailing list