[Buildroot] [PATCH 1/1] package/mbedtls: security bump to version 2.16.6

Thomas Petazzoni thomas.petazzoni at bootlin.com
Wed Apr 15 19:50:05 UTC 2020


On Tue, 14 Apr 2020 18:44:48 +0200
Fabrice Fontaine <fontaine.fabrice at gmail.com> wrote:

> - Fix CVE-2020-10932: fix side channel in ECC code that allowed an
>   adversary with access to precise enough timing and memory access
>   information (typically an untrusted operating system attacking a
>   secure enclave) to fully recover an ECDSA private key.
> - Fix a potentially remotely exploitable buffer overread in a DTLS
>   client when parsing the Hello Verify Request message.
> - Fix bug in DTLS handling of new associations with the same parameters
>   (RFC 6347 section 4.2.8): after sending its HelloVerifyRequest, the
>   server would end up with corrupted state and only send invalid records
>   to the client. An attacker able to send forged UDP packets to the
>   server could use that to obtain a Denial of Service. This could only
>   happen when MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE was enabled in
>   config.h (which it is by default).
> 
> Signed-off-by: Fabrice Fontaine <fontaine.fabrice at gmail.com>
> ---
>  package/mbedtls/mbedtls.hash | 6 +++---
>  package/mbedtls/mbedtls.mk   | 2 +-
>  2 files changed, 4 insertions(+), 4 deletions(-)

Applied to master, thanks.

Thomas
-- 
Thomas Petazzoni, CTO, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com



More information about the buildroot mailing list