package/mbedtls: security bump to version 2.16.5
authorFabrice Fontaine <fontaine.fabrice@gmail.com>
Fri, 21 Feb 2020 21:56:46 +0000 (22:56 +0100)
committerYann E. MORIN <yann.morin.1998@free.fr>
Sun, 23 Feb 2020 08:27:49 +0000 (09:27 +0100)
commit07fd2da5958b312aaa68d10b0496f9d120c37941
tree71d8090efea1efc187eb5eda338213da453df2c0
parent62e65fd50dc64500f8aa07127ef5ac1e8cc48d6e
package/mbedtls: security bump to version 2.16.5

- Fix potential memory overread when performing an ECDSA signature
   operation. The overread only happens with cryptographically low
   probability (of the order of 2^-n where n is the bitsize of the
   curve) unless the RNG is broken, and could result in information
   disclosure or denial of service (application crash or extra resource
   consumption).
 - To avoid a side channel vulnerability when parsing an RSA private
   key, read all the CRT parameters from the DER structure rather than
   reconstructing them.
 - Update indentation of hash file (two spaces)

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
package/mbedtls/mbedtls.hash
package/mbedtls/mbedtls.mk