orangepizza b5c728948c
mbedtls: security bump to version 2.28.7
This release of Mbed TLS provides bug fixes and minor enhancements. This
release includes fixes for following security issues:

* Timing side channel in private key RSA operations (CVE-2024-23170)

  Mbed TLS is vulnerable to a timing side channel in private key RSA
  operations. This side channel could be sufficient for an attacker to
  recover the plaintext. A local attacker or a remote attacker who is
  close to the victim on the network might have precise enough timing
  measurements to exploit this. It requires the attacker to send a large
  number of messages for decryption.

* Buffer overflow in mbedtls_x509_set_extension() (CVE-2024-23775)

  When writing x509 extensions we failed to validate inputs passed in to
  mbedtls_x509_set_extension(), which could result in an integer overflow,
  causing a zero-length buffer to be allocated to hold the extension. The
  extension would then be copied into the buffer, causing a heap buffer
  overflow.

Fixes: CVE-2024-23170, CVE-2024-23775
References: https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-1/
References: https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-2/
Signed-off-by: orangepizza <tjtncks@gmail.com>
Signed-off-by: Petr Štetiar <ynezz@true.cz> [formal fixes]
(cherry picked from commit 920414ca8848fe1b430e436207b4f8c927819368)
2024-01-29 09:41:19 +00:00
..
2023-05-24 19:26:24 +01:00
2022-09-06 16:36:44 +01:00
2022-09-06 16:36:45 +01:00
2023-07-20 08:04:11 +02:00
2023-11-05 12:22:47 +01:00
2023-05-18 10:14:13 +02:00
2023-10-31 00:44:03 +01:00
2022-07-10 19:07:47 +02:00
2023-01-13 22:02:20 +01:00
2022-09-07 04:22:40 +01:00
2023-05-24 19:26:28 +01:00
2023-02-26 01:12:02 +01:00
2023-08-27 23:49:27 +02:00
2023-10-26 00:14:10 +02:00
2023-09-27 22:37:13 +02:00
2022-10-23 18:16:22 +02:00
2023-11-11 18:18:29 +01:00