diff options
author | Eneas U de Queiroz <cotequeiroz@gmail.com> | 2019-08-05 11:47:58 -0300 |
---|---|---|
committer | Hauke Mehrtens <hauke@hauke-m.de> | 2019-08-17 16:43:23 +0200 |
commit | 77e0e99d3104debc7ce31d6c15ff1e10e19ceb7c (patch) | |
tree | 67e9cf8898201ab77d30f91a4f6b844e0c83c55e /package/libs/readline | |
parent | 16730410136f1512203da9d21bb6a42f1cb43b4e (diff) | |
download | upstream-77e0e99d3104debc7ce31d6c15ff1e10e19ceb7c.tar.gz upstream-77e0e99d3104debc7ce31d6c15ff1e10e19ceb7c.tar.bz2 upstream-77e0e99d3104debc7ce31d6c15ff1e10e19ceb7c.zip |
wolfssl: bump to 4.1.0-stable
Always build AES-GCM support.
Unnecessary patches were removed.
This includes two vulnerability fixes:
CVE-2019-11873: a potential buffer overflow case with the TLSv1.3 PSK
extension parsing.
CVE-2019-13628 (currently assigned-only): potential leak of nonce sizes
when performing ECDSA signing operations. The leak is considered to be
difficult to exploit but it could potentially be used maliciously to
perform a lattice based timing attack.
Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
Diffstat (limited to 'package/libs/readline')
0 files changed, 0 insertions, 0 deletions