aboutsummaryrefslogtreecommitdiffstats
path: root/target/linux/ar7/generic
diff options
context:
space:
mode:
authorEneas U de Queiroz <cotequeiroz@gmail.com>2019-08-05 11:47:58 -0300
committerHauke Mehrtens <hauke@hauke-m.de>2019-08-17 16:43:23 +0200
commit77e0e99d3104debc7ce31d6c15ff1e10e19ceb7c (patch)
tree67e9cf8898201ab77d30f91a4f6b844e0c83c55e /target/linux/ar7/generic
parent16730410136f1512203da9d21bb6a42f1cb43b4e (diff)
downloadupstream-77e0e99d3104debc7ce31d6c15ff1e10e19ceb7c.tar.gz
upstream-77e0e99d3104debc7ce31d6c15ff1e10e19ceb7c.tar.bz2
upstream-77e0e99d3104debc7ce31d6c15ff1e10e19ceb7c.zip
wolfssl: bump to 4.1.0-stable
Always build AES-GCM support. Unnecessary patches were removed. This includes two vulnerability fixes: CVE-2019-11873: a potential buffer overflow case with the TLSv1.3 PSK extension parsing. CVE-2019-13628 (currently assigned-only): potential leak of nonce sizes when performing ECDSA signing operations. The leak is considered to be difficult to exploit but it could potentially be used maliciously to perform a lattice based timing attack. Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
Diffstat (limited to 'target/linux/ar7/generic')
0 files changed, 0 insertions, 0 deletions