[Buildroot] [PATCH 1/1] package/mbedtls: security bump to version 2.16.6
peter at korsgaard.com
Wed May 6 05:13:50 UTC 2020
>>>>> "Fabrice" == Fabrice Fontaine <fontaine.fabrice at gmail.com> writes:
> - Fix CVE-2020-10932: fix side channel in ECC code that allowed an
> adversary with access to precise enough timing and memory access
> information (typically an untrusted operating system attacking a
> secure enclave) to fully recover an ECDSA private key.
> - Fix a potentially remotely exploitable buffer overread in a DTLS
> client when parsing the Hello Verify Request message.
> - Fix bug in DTLS handling of new associations with the same parameters
> (RFC 6347 section 4.2.8): after sending its HelloVerifyRequest, the
> server would end up with corrupted state and only send invalid records
> to the client. An attacker able to send forged UDP packets to the
> server could use that to obtain a Denial of Service. This could only
> happen when MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE was enabled in
> config.h (which it is by default).
> Signed-off-by: Fabrice Fontaine <fontaine.fabrice at gmail.com>
Committed to 2020.02.x, thanks.
Bye, Peter Korsgaard
More information about the buildroot