Due to a security advisory released on August 28th 2017[1], it's advisable to update mbedTLS to 2.6.0. The vulnerability, identified as CVE-2017-14032, allows bypassing the authentication of a peer when the authentication mode is configured as optional (the default is secure, but applications might change the setting.) tests/crypto/mbedtls is passing. [1] https://goo.gl/s4imN6 Signed-off-by: Leandro Pereira <leandro.pereira@intel.com> |
||
|---|---|---|
| .. | ||
| debug | ||
| fs | ||
| hal | ||
| lib | ||
| Kbuild | ||
| Kconfig | ||
| Makefile | ||