694c7d3ece
- Fix a buffer overflow in mbedtls_mpi_sub_abs() when calculating |A| - |B| where |B| is larger than |A| and has more limbs (so the function should return MBEDTLS_ERR_MPI_NEGATIVE_VALUE). Only applications calling mbedtls_mpi_sub_abs() directly are affected: all calls inside the library were safe since this function is only called with |A| >= |B|. - Fix an errorneous estimation for an internal buffer in mbedtls_pk_write_key_pem(). If MBEDTLS_MPI_MAX_SIZE is set to an odd value the function might fail to write a private RSA keys of the largest supported size. - Fix a stack buffer overflow with mbedtls_net_poll() and mbedtls_net_recv_timeout() when given a file descriptor that is beyond FD_SETSIZE. - Guard against strong local side channel attack against base64 tables by making access aceess to them use constant flow code. https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.10 Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> [yann.morin.1998@free.fr: fix the hash after upstream mess-up] Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
5 lines
272 B
Plaintext
5 lines
272 B
Plaintext
# From https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.10:
|
|
sha256 96257bb03b30300b2f35f861ffe204ed957e9fd0329d80646fe57fc49f589b29 mbedtls-2.16.10.tar.gz
|
|
# Locally calculated
|
|
sha256 cfc7749b96f63bd31c3c42b5c471bf756814053e847c10f3eb003417bc523d30 apache-2.0.txt
|