pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/mbedtls mbedtls: update to 2.28.2.



details:   https://anonhg.NetBSD.org/pkgsrc/rev/713c8cb84f09
branches:  trunk
changeset: 391066:713c8cb84f09
user:      wiz <wiz%pkgsrc.org@localhost>
date:      Tue Jan 03 12:47:51 2023 +0000

description:
mbedtls: update to 2.28.2.

= Mbed TLS 2.28.2 branch released 2022-12-14

Security
   * Fix potential heap buffer overread and overwrite in DTLS if
     MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and
     MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.
   * An adversary with access to precise enough information about memory
     accesses (typically, an untrusted operating system attacking a secure
     enclave) could recover an RSA private key after observing the victim
     performing a single private-key operation if the window size used for the
     exponentiation was 3 or smaller. Found and reported by Zili KOU,
     Wenjian HE, Sharad Sinha, and Wei ZHANG. See "Cache Side-channel Attacks
     and Defenses of the Sliding Window Algorithm in TEEs" - Design, Automation
     and Test in Europe 2023.

Bugfix
   * Fix a long-standing build failure when building x86 PIC code with old
     gcc (4.x). The code will be slower, but will compile. We do however
     recommend upgrading to a more recent compiler instead. Fixes #1910.
   * Fix support for little-endian Microblaze when MBEDTLS_HAVE_ASM is defined.
     Contributed by Kazuyuki Kimura to fix #2020.
   * Use double quotes to include private header file psa_crypto_cipher.h.
     Fixes 'file not found with <angled> include' error
     when building with Xcode.
   * Fix handling of broken symlinks when loading certificates using
     mbedtls_x509_crt_parse_path(). Instead of returning an error as soon as a
     broken link is encountered, skip the broken link and continue parsing
     other certificate files. Contributed by Eduardo Silva in #2602.
   * Fix a compilation error when using CMake with an IAR toolchain.
     Fixes #5964.
   * Fix bugs and missing dependencies when building and testing
     configurations with only one encryption type enabled in TLS 1.2.
   * Provide the missing definition of mbedtls_setbuf() in some configurations
     with MBEDTLS_PLATFORM_C disabled. Fixes #6118, #6196.
   * Fix compilation errors when trying to build with
     PSA drivers for AEAD (GCM, CCM, Chacha20-Poly1305).
   * Fix memory leak in ssl_parse_certificate_request() caused by
     mbedtls_x509_get_name() not freeing allocated objects in case of error.
     Change mbedtls_x509_get_name() to clean up allocated objects on error.
   * Fix checks on PK in check_config.h for builds with PSA and RSA. This does
     not change which builds actually work, only moving a link-time error to
     an early check.
   * Fix ECDSA verification, where it was not always validating the
     public key. This bug meant that it was possible to verify a
     signature with an invalid public key, in some cases. Reported by
     Guido Vranken using Cryptofuzz in #4420.
   * Fix a possible null pointer dereference if a memory allocation fails
     in TLS PRF code. Reported by Michael Madsen in #6516.
   * Fix a bug in which mbedtls_x509_crt_info() would produce non-printable
     bytes when parsing certificates containing a binary RFC 4108
     HardwareModuleName as a Subject Alternative Name extension. Hardware
     serial numbers are now rendered in hex format. Fixes #6262.
   * Fix bug in error reporting in dh_genprime.c where upon failure,
     the error code returned by mbedtls_mpi_write_file() is overwritten
     and therefore not printed.
   * In the bignum module, operations of the form (-A) - (+A) or (-A) - (-A)
     with A > 0 created an unintended representation of the value 0 which was
     not processed correctly by some bignum operations. Fix this. This had no
     consequence on cryptography code, but might affect applications that call
     bignum directly and use negative numbers.
   * Fix undefined behavior (typically harmless in practice) of
     mbedtls_mpi_add_mpi(), mbedtls_mpi_add_abs() and mbedtls_mpi_add_int()
     when both operands are 0 and the left operand is represented with 0 limbs.
   * Fix undefined behavior (typically harmless in practice) when some bignum
     functions receive the most negative value of mbedtls_mpi_sint. Credit
     to OSS-Fuzz. Fixes #6597.
   * Fix undefined behavior (typically harmless in practice) in PSA ECB
     encryption and decryption.

diffstat:

 security/mbedtls/Makefile |  4 ++--
 security/mbedtls/distinfo |  8 ++++----
 2 files changed, 6 insertions(+), 6 deletions(-)

diffs (25 lines):

diff -r d4b6adcf4ed6 -r 713c8cb84f09 security/mbedtls/Makefile
--- a/security/mbedtls/Makefile Tue Jan 03 12:45:32 2023 +0000
+++ b/security/mbedtls/Makefile Tue Jan 03 12:47:51 2023 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.23 2022/08/11 06:46:43 wiz Exp $
+# $NetBSD: Makefile,v 1.24 2023/01/03 12:47:51 wiz Exp $
 
-DISTNAME=      mbedtls-2.28.1
+DISTNAME=      mbedtls-2.28.2
 CATEGORIES=    security
 MASTER_SITES=  ${MASTER_SITE_GITHUB:=ARMmbed/}
 GITHUB_TAG=    ${DISTNAME}
diff -r d4b6adcf4ed6 -r 713c8cb84f09 security/mbedtls/distinfo
--- a/security/mbedtls/distinfo Tue Jan 03 12:45:32 2023 +0000
+++ b/security/mbedtls/distinfo Tue Jan 03 12:47:51 2023 +0000
@@ -1,5 +1,5 @@
-$NetBSD: distinfo,v 1.18 2022/08/11 06:40:38 wiz Exp $
+$NetBSD: distinfo,v 1.19 2023/01/03 12:47:51 wiz Exp $
 
-BLAKE2s (mbedtls-2.28.1.tar.gz) = 3486a1a69c491996e86136474339c8f73f2fa168f2cb4a375efb42f7a44a9788
-SHA512 (mbedtls-2.28.1.tar.gz) = cc75027ebbefb4ba1aecdc386cf6b60cceeceda79a474ff5ba67411e41aac9fc2c43c2fb0158be667f1b91e6c19082e17e4e61409acc1498b568f5efc7b00a2c
-Size (mbedtls-2.28.1.tar.gz) = 3914438 bytes
+BLAKE2s (mbedtls-2.28.2.tar.gz) = e2bb03fbe4fd8a0448746245138fe952be66301896d8c2697b2d3c2bf91af87a
+SHA512 (mbedtls-2.28.2.tar.gz) = e459e9b7ba78a536e96842a76c867b08ea3b2ce02cd09e396eadb8760c47edc041e1df541cabe76de52b9b974007829a0288bc9619683f6a601c234b0eece69f
+Size (mbedtls-2.28.2.tar.gz) = 3934889 bytes



Home | Main Index | Thread Index | Old Index