pkgsrc/security/mbedtls1/distinfo
fhajny 0d336a4850 Update security/mbedtls1 to 1.3.17
Security
- Fixed missing padding length check required by PKCS1 v2.2 in
  mbedtls_rsa_rsaes_pkcs1_v15_decrypt(). (considered low impact)
- Fixed potential integer overflow to buffer overflow in
  mbedtls_rsa_rsaes_pkcs1_v15_encrypt() and
  mbedtls_rsa_rsaes_oaep_encrypt(). (not triggerable remotely in
  (D)TLS).
- Fixed potential integer underflow to buffer overread in
  mbedtls_rsa_rsaes_oaep_decrypt(). It is not triggerable remotely
in SSL/TLS.

Bugfix
- Fixed bug in mbedtls_mpi_add_mpi() that caused wrong results
  when the three arguments were the same (in-place doubling). #309
- Fixed issue in Makefile that prevented building using armar.
  #386
- Fixed issue that caused a hang when generating RSA keys of odd
  bitlength.
- Fixed bug in mbedtls_rsa_rsaes_pkcs1_v15_encrypt() that made
  null pointer dereference possible.
- Fixed issue that caused a crash if invalid curves were passed to
  mbedtls_ssl_conf_curves(). #373

Changes
- On ARM platforms, when compiling with -O0 with GCC, Clang or
  armcc5, don't use the optimized assembly for bignum
  multiplication. This removes the need to pass -fomit-frame-pointer
  to avoid a build error with -O0.
- Disabled SSLv3 in the default configuration.
2016-09-15 10:48:01 +00:00

9 lines
638 B
Text

$NetBSD: distinfo,v 1.2 2016/09/15 10:48:01 fhajny Exp $
SHA1 (mbedtls-1.3.17-gpl.tgz) = f6e6d0e08e4425e0cbd141dd007541fedfff2a3e
RMD160 (mbedtls-1.3.17-gpl.tgz) = e923a83cc73a3f9a0e529921394417e60dbf5df8
SHA512 (mbedtls-1.3.17-gpl.tgz) = d8ca5c0f5550c9384b5ec9602aca314f6b95b8d320017217f6a66fee5e25989dc8ef8aeb046e887a478b12e0df879a3399a4ab99fc21b091888f30ab1ad2b2ea
Size (mbedtls-1.3.17-gpl.tgz) = 1766596 bytes
SHA1 (patch-Makefile) = 80698e16a397133de134ab582016b9e91ad652f0
SHA1 (patch-library_Makefile) = a3dcd83fb1cc74f59745f2168f14926c077a5289
SHA1 (patch-programs_test_CMakeLists.txt) = 94ce731d81f1584c406e3b295c84fd6a5c327a50