diff options
author | Hauke Mehrtens <hauke@hauke-m.de> | 2021-02-09 00:53:09 +0100 |
---|---|---|
committer | Hauke Mehrtens <hauke@hauke-m.de> | 2021-02-09 23:12:49 +0100 |
commit | 1f559cafe5cc1193a5962d40a2d938c66c783171 (patch) | |
tree | a543aaa864e53d2421fe201d0e8193650b29a56a /LICENSE | |
parent | ff076f873f3bb01e4613f925315ae73c76a2d914 (diff) | |
download | upstream-1f559cafe5cc1193a5962d40a2d938c66c783171.tar.gz upstream-1f559cafe5cc1193a5962d40a2d938c66c783171.tar.bz2 upstream-1f559cafe5cc1193a5962d40a2d938c66c783171.zip |
wolfssl: Backport fix for CVE-2021-3336
This should fix CVE-2021-3336:
DoTls13CertificateVerify in tls13.c in wolfSSL through 4.6.0 does not
cease processing for certain anomalous peer behavior (sending an
ED22519, ED448, ECC, or RSA signature without the corresponding
certificate).
The patch is backported from the upstream wolfssl development branch.
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Diffstat (limited to 'LICENSE')
0 files changed, 0 insertions, 0 deletions