db2ea0bcaa
= mbed TLS 2.16.6 branch released 2020-04-14 Security * Fix side channel in ECC code that allowed an adversary with access to precise enough timing and memory access information (typically an untrusted operating system attacking a secure enclave) to fully recover an ECDSA private key. Found and reported by Alejandro Cabrera Aldaya, Billy Brumley and Cesar Pereida Garcia. CVE-2020-10932 * Fix a potentially remotely exploitable buffer overread in a DTLS client when parsing the Hello Verify Request message. Bugfix * Fix compilation failure when both MBEDTLS_SSL_PROTO_DTLS and MBEDTLS_SSL_HW_RECORD_ACCEL are enabled. * Fix a function name in a debug message. Contributed by Ercan Ozturk in #3013.
7 lines
503 B
Text
7 lines
503 B
Text
$NetBSD: distinfo,v 1.9 2020/04/18 14:21:56 nia Exp $
|
|
|
|
SHA1 (mbedtls-2.16.6-apache.tgz) = 3cb5b681597a5bd798d31038c129c0dc911d8a2c
|
|
RMD160 (mbedtls-2.16.6-apache.tgz) = da5ede944292874afdb24a8fe21c643b34255206
|
|
SHA512 (mbedtls-2.16.6-apache.tgz) = a0c48b694d7bc70256d26c44bfb2ac802428560b02e50fe2e47762bc595e2c7b8fac934badb3452acb01d8a54386eafae0ff2894320d24ab7554f1c8e6cb4bcf
|
|
Size (mbedtls-2.16.6-apache.tgz) = 2699220 bytes
|
|
SHA1 (patch-library_net__sockets.c) = cd8f9cf84947800eb73d004847789626511ceb35
|