polarssl: security bump to version 1.2.18
authorGustavo Zacarias <gustavo@zacarias.com.ar>
Thu, 12 Nov 2015 19:30:46 +0000 (16:30 -0300)
committerPeter Korsgaard <peter@korsgaard.com>
Thu, 12 Nov 2015 21:24:50 +0000 (22:24 +0100)
commit3fe2eb9ed02070a648f75e0eb120ce45b1064c70
treeb5a0747215b8feb7953e36814fa50e79e4d124cd
parent3120db1508e02eca607c28b9abb6d97984ba7be0
polarssl: security bump to version 1.2.18

Fixes a potential heap corruption on Windows when
mbedtls_x509_crt_parse_path() is passed a path longer than 2GB. This
cannot be triggered remotely. Found by Guido Vranken, Intelworks.

Fixes a potential buffer overflow in some asn1_write_xxx() functions.
This cannot be triggered remotely unless you create X.509 certificates
based on untrusted input or write keys of untrusted origin. Found by
Guido Vranken, Intelworks.

The X509 max_pathlen constraint was not enforced on intermediate
certificates. Found by Nicholas Wilson, and fix and tests provided by
Janos Follath.

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/polarssl/polarssl.hash
package/polarssl/polarssl.mk