* [Buildroot] [PATCH] mbedtls: security bump to version 2.7.0
@ 2018-02-23 4:56 Baruch Siach
2018-02-23 8:09 ` Peter Korsgaard
2018-04-10 20:47 ` Peter Korsgaard
0 siblings, 2 replies; 3+ messages in thread
From: Baruch Siach @ 2018-02-23 4:56 UTC (permalink / raw)
To: buildroot
CVE-2018-0487: Remote attackers can execute arbitrary code or cause a
denial of service (buffer overflow) via a crafted certificate chain that
is mishandled during RSASSA-PSS signature verification within a TLS or
DTLS session.
CVE-2018-0488: When the truncated HMAC extension and CBC are used,
allows remote attackers to execute arbitrary code or cause a denial of
service (heap corruption) via a crafted application packet within a TLS
or DTLS session.
Signed-off-by: Baruch Siach <baruch@tkos.co.il>
---
package/mbedtls/mbedtls.hash | 6 +++---
package/mbedtls/mbedtls.mk | 2 +-
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/package/mbedtls/mbedtls.hash b/package/mbedtls/mbedtls.hash
index d04b8677540a..a62c0f58decf 100644
--- a/package/mbedtls/mbedtls.hash
+++ b/package/mbedtls/mbedtls.hash
@@ -1,5 +1,5 @@
-# From https://tls.mbed.org/tech-updates/releases/mbedtls-2.6.0-2.1.9-and-1.3.21-released
-sha1 e914288da50977f541773f9d36e26f14926594a5 mbedtls-2.6.0-apache.tgz
-sha256 99bc9d4212d3d885eeb96273bcde8ecc649a481404b8d7ea7bb26397c9909687 mbedtls-2.6.0-apache.tgz
+# From https://tls.mbed.org/tech-updates/releases/mbedtls-2.7.0-2.1.10-and-1.3.22-released
+sha1 01ffebf679c8696cc941c41224fa73d8944d2c85 mbedtls-2.7.0-apache.tgz
+sha256 aeb66d6cd43aa1c79c145d15845c655627a7fc30d624148aaafbb6c36d7f55ef mbedtls-2.7.0-apache.tgz
# Locally calculated
sha256 cfc7749b96f63bd31c3c42b5c471bf756814053e847c10f3eb003417bc523d30 apache-2.0.txt
diff --git a/package/mbedtls/mbedtls.mk b/package/mbedtls/mbedtls.mk
index 64ce18cf6fe5..7c26ea95ee60 100644
--- a/package/mbedtls/mbedtls.mk
+++ b/package/mbedtls/mbedtls.mk
@@ -5,7 +5,7 @@
################################################################################
MBEDTLS_SITE = https://tls.mbed.org/code/releases
-MBEDTLS_VERSION = 2.6.0
+MBEDTLS_VERSION = 2.7.0
MBEDTLS_SOURCE = mbedtls-$(MBEDTLS_VERSION)-apache.tgz
MBEDTLS_CONF_OPTS = \
-DENABLE_PROGRAMS=$(if $(BR2_PACKAGE_MBEDTLS_PROGRAMS),ON,OFF) \
--
2.16.1
^ permalink raw reply related [flat|nested] 3+ messages in thread
* [Buildroot] [PATCH] mbedtls: security bump to version 2.7.0
2018-02-23 4:56 [Buildroot] [PATCH] mbedtls: security bump to version 2.7.0 Baruch Siach
@ 2018-02-23 8:09 ` Peter Korsgaard
2018-04-10 20:47 ` Peter Korsgaard
1 sibling, 0 replies; 3+ messages in thread
From: Peter Korsgaard @ 2018-02-23 8:09 UTC (permalink / raw)
To: buildroot
>>>>> "Baruch" == Baruch Siach <baruch@tkos.co.il> writes:
> CVE-2018-0487: Remote attackers can execute arbitrary code or cause a
> denial of service (buffer overflow) via a crafted certificate chain that
> is mishandled during RSASSA-PSS signature verification within a TLS or
> DTLS session.
Argh :/
> CVE-2018-0488: When the truncated HMAC extension and CBC are used,
> allows remote attackers to execute arbitrary code or cause a denial of
> service (heap corruption) via a crafted application packet within a TLS
> or DTLS session.
> Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Committed, thanks.
--
Bye, Peter Korsgaard
^ permalink raw reply [flat|nested] 3+ messages in thread
* [Buildroot] [PATCH] mbedtls: security bump to version 2.7.0
2018-02-23 4:56 [Buildroot] [PATCH] mbedtls: security bump to version 2.7.0 Baruch Siach
2018-02-23 8:09 ` Peter Korsgaard
@ 2018-04-10 20:47 ` Peter Korsgaard
1 sibling, 0 replies; 3+ messages in thread
From: Peter Korsgaard @ 2018-04-10 20:47 UTC (permalink / raw)
To: buildroot
>>>>> "Baruch" == Baruch Siach <baruch@tkos.co.il> writes:
> CVE-2018-0487: Remote attackers can execute arbitrary code or cause a
> denial of service (buffer overflow) via a crafted certificate chain that
> is mishandled during RSASSA-PSS signature verification within a TLS or
> DTLS session.
> CVE-2018-0488: When the truncated HMAC extension and CBC are used,
> allows remote attackers to execute arbitrary code or cause a denial of
> service (heap corruption) via a crafted application packet within a TLS
> or DTLS session.
> Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Committed to 2017.02.x, thanks.
--
Bye, Peter Korsgaard
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2018-04-10 20:47 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-02-23 4:56 [Buildroot] [PATCH] mbedtls: security bump to version 2.7.0 Baruch Siach
2018-02-23 8:09 ` Peter Korsgaard
2018-04-10 20:47 ` Peter Korsgaard
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.