aboutsummaryrefslogtreecommitdiffstats
path: root/package/libs/wolfssl/patches/100-disable-hardening-check.patch
diff options
context:
space:
mode:
authorEneas U de Queiroz <cotequeiroz@gmail.com>2022-04-08 10:27:25 -0300
committerHauke Mehrtens <hauke@hauke-m.de>2022-04-11 22:52:57 +0200
commitc5ef62a218455f5d60b8f76307784a90a77dda43 (patch)
tree32a29134b1b3ec1e1c90a44b8ed571c518fd2008 /package/libs/wolfssl/patches/100-disable-hardening-check.patch
parent99b00edf35bc11c3cd761762a5e880ac1daea067 (diff)
downloadupstream-c5ef62a218455f5d60b8f76307784a90a77dda43.tar.gz
upstream-c5ef62a218455f5d60b8f76307784a90a77dda43.tar.bz2
upstream-c5ef62a218455f5d60b8f76307784a90a77dda43.zip
wolfssl: bump to 5.2.0
Fixes two high-severity vulnerabilities: - CVE-2022-25640: A TLS v1.3 server who requires mutual authentication can be bypassed. If a malicious client does not send the certificate_verify message a client can connect without presenting a certificate even if the server requires one. - CVE-2022-25638: A TLS v1.3 client attempting to authenticate a TLS v1.3 server can have its certificate heck bypassed. If the sig_algo in the certificate_verify message is different than the certificate message checking may be bypassed. Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com> (cherry picked from commit e89f3e85eb1c1d81294e5d430a91b0ba625e2ec0)
Diffstat (limited to 'package/libs/wolfssl/patches/100-disable-hardening-check.patch')
-rw-r--r--package/libs/wolfssl/patches/100-disable-hardening-check.patch2
1 files changed, 1 insertions, 1 deletions
diff --git a/package/libs/wolfssl/patches/100-disable-hardening-check.patch b/package/libs/wolfssl/patches/100-disable-hardening-check.patch
index 79d0d6f759..7e473b390b 100644
--- a/package/libs/wolfssl/patches/100-disable-hardening-check.patch
+++ b/package/libs/wolfssl/patches/100-disable-hardening-check.patch
@@ -1,6 +1,6 @@
--- a/wolfssl/wolfcrypt/settings.h
+++ b/wolfssl/wolfcrypt/settings.h
-@@ -2346,7 +2346,7 @@ extern void uITRON4_free(void *p) ;
+@@ -2338,7 +2338,7 @@ extern void uITRON4_free(void *p) ;
#endif
/* warning for not using harden build options (default with ./configure) */