aboutsummaryrefslogtreecommitdiffstats
path: root/package/libs/wolfssl/patches/200-ecc-rng.patch
diff options
context:
space:
mode:
authorEneas U de Queiroz <cotequeiroz@gmail.com>2022-04-08 10:27:25 -0300
committerHauke Mehrtens <hauke@hauke-m.de>2022-04-11 21:41:03 +0200
commite89f3e85eb1c1d81294e5d430a91b0ba625e2ec0 (patch)
tree27df09977248c3782a86a605119d0f20a2da4127 /package/libs/wolfssl/patches/200-ecc-rng.patch
parentc9c2b01b8441195807e8b492c7d3e385e6c6afdc (diff)
downloadupstream-e89f3e85eb1c1d81294e5d430a91b0ba625e2ec0.tar.gz
upstream-e89f3e85eb1c1d81294e5d430a91b0ba625e2ec0.tar.bz2
upstream-e89f3e85eb1c1d81294e5d430a91b0ba625e2ec0.zip
wolfssl: bump to 5.2.0
Fixes two high-severity vulnerabilities: - CVE-2022-25640: A TLS v1.3 server who requires mutual authentication can be bypassed. If a malicious client does not send the certificate_verify message a client can connect without presenting a certificate even if the server requires one. - CVE-2022-25638: A TLS v1.3 client attempting to authenticate a TLS v1.3 server can have its certificate heck bypassed. If the sig_algo in the certificate_verify message is different than the certificate message checking may be bypassed. Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
Diffstat (limited to 'package/libs/wolfssl/patches/200-ecc-rng.patch')
-rw-r--r--package/libs/wolfssl/patches/200-ecc-rng.patch4
1 files changed, 2 insertions, 2 deletions
diff --git a/package/libs/wolfssl/patches/200-ecc-rng.patch b/package/libs/wolfssl/patches/200-ecc-rng.patch
index 78ff4b1f4a..f1f156a8ae 100644
--- a/package/libs/wolfssl/patches/200-ecc-rng.patch
+++ b/package/libs/wolfssl/patches/200-ecc-rng.patch
@@ -11,7 +11,7 @@ RNG regardless of the built settings for wolfssl.
--- a/wolfcrypt/src/ecc.c
+++ b/wolfcrypt/src/ecc.c
-@@ -11647,21 +11647,21 @@ void wc_ecc_fp_free(void)
+@@ -11655,21 +11655,21 @@ void wc_ecc_fp_free(void)
#endif /* FP_ECC */
@@ -37,7 +37,7 @@ RNG regardless of the built settings for wolfssl.
--- a/wolfssl/wolfcrypt/ecc.h
+++ b/wolfssl/wolfcrypt/ecc.h
-@@ -647,10 +647,8 @@ WOLFSSL_API
+@@ -650,10 +650,8 @@ WOLFSSL_API
void wc_ecc_fp_free(void);
WOLFSSL_LOCAL
void wc_ecc_fp_init(void);