Changelog: https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2 This release of Mbed TLS provides bug fixes and minor enhancements. This release includes fixes for security issues. Fixes the following CVEs: * CVE-2022-46393: Fix potential heap buffer overread and overwrite in DTLS if MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX. * CVE-2022-46392: An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) could recover an RSA private key after observing the victim performing a single private-key operation if the window size used for the exponentiation was 3 or smaller. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
		
			
				
	
	
		
			23 lines
		
	
	
		
			723 B
		
	
	
	
		
			Diff
		
	
	
	
	
	
			
		
		
	
	
			23 lines
		
	
	
		
			723 B
		
	
	
	
		
			Diff
		
	
	
	
	
	
Fix a compile problem introduced in commit 331c3421d1f0 ("Address review comments")
 | 
						|
 | 
						|
Bug report: https://github.com/Mbed-TLS/mbedtls/issues/6243
 | 
						|
 | 
						|
--- a/programs/ssl/ssl_server2.c
 | 
						|
+++ b/programs/ssl/ssl_server2.c
 | 
						|
@@ -2529,7 +2529,6 @@ int main( int argc, char *argv[] )
 | 
						|
         }
 | 
						|
         key_cert_init2 = 2;
 | 
						|
 #endif /* MBEDTLS_ECDSA_C */
 | 
						|
-    }
 | 
						|
 
 | 
						|
 #if defined(MBEDTLS_USE_PSA_CRYPTO)
 | 
						|
     if( opt.key_opaque != 0 )
 | 
						|
@@ -2558,6 +2557,7 @@ int main( int argc, char *argv[] )
 | 
						|
     }
 | 
						|
 #endif /* MBEDTLS_USE_PSA_CRYPTO */
 | 
						|
 #endif /* MBEDTLS_CERTS_C */
 | 
						|
+    }
 | 
						|
 
 | 
						|
     mbedtls_printf( " ok (key types: %s - %s)\n", mbedtls_pk_get_name( &pkey ), mbedtls_pk_get_name( &pkey2 ) );
 | 
						|
 #endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
 |