Accepting request 337106 from devel:libraries:c_c++
- Update to 1.3.14 * Added fix for CVE-2015-5291 (boo#949380) to prevent heap corruption due to buffer overflow of the hostname or session ticket. Found by Guido Vranken, Intelworks. OBS-URL: https://build.opensuse.org/request/show/337106 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=5
This commit is contained in:
parent
5679e57a39
commit
22197980c8
@ -1,3 +0,0 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
|
||||||
oid sha256:67a593027b6a442a4fa5b6c224c4ac8cdae5be721f5a28a11d34f10dcda441cb
|
|
||||||
size 1731809
|
|
3
mbedtls-1.3.14-gpl.tgz
Normal file
3
mbedtls-1.3.14-gpl.tgz
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:be76915bc406b4c4109629624baa5bf610a805d9976404e4086d44e5e6c86ff8
|
||||||
|
size 1744343
|
@ -1,3 +1,78 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Thu Oct 8 06:53:02 UTC 2015 - mpluskal@suse.com
|
||||||
|
|
||||||
|
- Update to 1.3.14
|
||||||
|
* Added fix for CVE-2015-5291 (boo#949380) to prevent heap corruption due to buffer
|
||||||
|
overflow of the hostname or session ticket. Found by Guido Vranken,
|
||||||
|
Intelworks.
|
||||||
|
* Fix stack buffer overflow in pkcs12 decryption (used by
|
||||||
|
mbedtls_pk_parse_key(file)() when the password is > 129 bytes. Found by
|
||||||
|
Guido Vranken, Intelworks. Not triggerable remotely.
|
||||||
|
* Fix potential buffer overflow in mbedtls_mpi_read_string().
|
||||||
|
Found by Guido Vranken, Intelworks. Not exploitable remotely in the context
|
||||||
|
of TLS, but might be in other uses. On 32 bit machines, requires reading a
|
||||||
|
string of close to or larger than 1GB to exploit; on 64 bit machines, would
|
||||||
|
require reading a string of close to or larger than 2^62 bytes.
|
||||||
|
* Fix potential random memory allocation in mbedtls_pem_read_buffer()
|
||||||
|
on crafted PEM input data. Found and fix provided by Guido Vranken,
|
||||||
|
Intelworks. Not triggerable remotely in TLS. Triggerable remotely if you
|
||||||
|
accept PEM data from an untrusted source.
|
||||||
|
* Fix potential double-free if ssl_set_psk() is called repeatedly on
|
||||||
|
the same ssl_context object and some memory allocations fail. Found by
|
||||||
|
Guido Vranken, Intelworks. Can not be forced remotely.
|
||||||
|
* Fix possible heap buffer overflow in base64_encode() when the input
|
||||||
|
buffer is 512MB or larger on 32-bit platforms. Found by Guido Vranken,
|
||||||
|
Intelworks. Found by Guido Vranken. Not trigerrable remotely in TLS.
|
||||||
|
* Fix potential heap buffer overflow in servers that perform client
|
||||||
|
authentication against a crafted CA cert. Cannot be triggered remotely
|
||||||
|
unless you allow third parties to pick trust CAs for client auth. Found by
|
||||||
|
Guido Vranken, Intelworks.
|
||||||
|
* Fix compile error in net.c with musl libc. Found and patch provided by
|
||||||
|
zhasha (#278).
|
||||||
|
* Fix macroization of 'inline' keywork when building as C++. (#279)
|
||||||
|
* Added checking of hostname length in ssl_set_hostname() to ensure domain
|
||||||
|
names are compliant with RFC 1035.
|
||||||
|
- Changes for 1.3.13
|
||||||
|
* Fix possible client-side NULL pointer dereference (read) when the client
|
||||||
|
tries to continue the handshake after it failed (a misuse of the API).
|
||||||
|
(Found and patch provided by Fabian Foerg, Gotham Digital Science using afl-fuzz.)
|
||||||
|
* Add countermeasure against Lenstra's RSA-CRT attack for PKCS#1 v1.5
|
||||||
|
signatures. (Found by Florian Weimer, Red Hat.)
|
||||||
|
https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/
|
||||||
|
* Setting SSL_MIN_DHM_BYTES in config.h had no effect (overriden in ssl.h)
|
||||||
|
(found by Fabio Solari) (#256)
|
||||||
|
* Fix bug in mbedtls_rsa_public() and mbedtls_rsa_private() that could
|
||||||
|
result trying to unlock an unlocked mutex on invalid input (found by
|
||||||
|
Fredrik Axelsson) (#257)
|
||||||
|
* Fix -Wshadow warnings (found by hnrkp) (#240)
|
||||||
|
* Fix unused function warning when using MBEDTLS_MDx_ALT or
|
||||||
|
MBEDTLS_SHAxxx_ALT (found by Henrik) (#239)
|
||||||
|
* Fix memory corruption in pkey programs (found by yankuncheng) (#210)
|
||||||
|
* Fix memory corruption on client with overlong PSK identity, around
|
||||||
|
SSL_MAX_CONTENT_LEN or higher - not triggerrable remotely (found by
|
||||||
|
Aleksandrs Saveljevs) (#238)
|
||||||
|
* Fix off-by-one error in parsing Supported Point Format extension that
|
||||||
|
caused some handshakes to fail.
|
||||||
|
* When verifying a certificate chain, if an intermediate certificate is
|
||||||
|
trusted, no later cert is checked. (suggested by hannes-landeholm)
|
||||||
|
(#220).
|
||||||
|
- Changes for 1.3.12
|
||||||
|
* Increase the minimum size of Diffie-Hellman parameters accepted by the
|
||||||
|
client to 1024 bits, to protect against Logjam attack.
|
||||||
|
* Increase the size of default Diffie-Hellman parameters on the server to
|
||||||
|
2048 bits. This can be changed with ssl_set_dh_params().
|
||||||
|
* Fix thread-safety issue in SSL debug module (found by Edwin van Vliet).
|
||||||
|
* Some example programs were not built using make, not included in Visual
|
||||||
|
Studio projects (found by Kristian Bendiksen).
|
||||||
|
* Fix build error with CMake and pre-4.5 versions of GCC (found by Hugo
|
||||||
|
Leisink).
|
||||||
|
* Fix missing -static-ligcc when building shared libraries for Windows with
|
||||||
|
make.
|
||||||
|
* Fix compile error with armcc5 --gnu.
|
||||||
|
* Add SSL_MIN_DHM_BYTES configuration parameter in config.h to choose the
|
||||||
|
minimum size of Diffie-Hellman parameters accepted by the client.
|
||||||
|
* The PEM parser now accepts a trailing space at end of lines (#226).
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Wed Jul 29 10:16:37 UTC 2015 - dimstar@opensuse.org
|
Wed Jul 29 10:16:37 UTC 2015 - dimstar@opensuse.org
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@
|
|||||||
|
|
||||||
%define lib_name lib%{name}9
|
%define lib_name lib%{name}9
|
||||||
Name: mbedtls
|
Name: mbedtls
|
||||||
Version: 1.3.11
|
Version: 1.3.14
|
||||||
Release: 0
|
Release: 0
|
||||||
Summary: Open Source embedded SSL/TLS cryptographic library
|
Summary: Open Source embedded SSL/TLS cryptographic library
|
||||||
License: GPL-2.0+
|
License: GPL-2.0+
|
||||||
|
Loading…
Reference in New Issue
Block a user