diff options
author | Eneas U de Queiroz <cotequeiroz@gmail.com> | 2022-04-08 10:27:25 -0300 |
---|---|---|
committer | Hauke Mehrtens <hauke@hauke-m.de> | 2022-04-11 22:52:57 +0200 |
commit | c5ef62a218455f5d60b8f76307784a90a77dda43 (patch) | |
tree | 32a29134b1b3ec1e1c90a44b8ed571c518fd2008 /target/linux/mediatek | |
parent | 99b00edf35bc11c3cd761762a5e880ac1daea067 (diff) | |
download | upstream-c5ef62a218455f5d60b8f76307784a90a77dda43.tar.gz upstream-c5ef62a218455f5d60b8f76307784a90a77dda43.tar.bz2 upstream-c5ef62a218455f5d60b8f76307784a90a77dda43.zip |
wolfssl: bump to 5.2.0
Fixes two high-severity vulnerabilities:
- CVE-2022-25640: A TLS v1.3 server who requires mutual authentication
can be bypassed. If a malicious client does not send the
certificate_verify message a client can connect without presenting a
certificate even if the server requires one.
- CVE-2022-25638: A TLS v1.3 client attempting to authenticate a TLS
v1.3 server can have its certificate heck bypassed. If the sig_algo in
the certificate_verify message is different than the certificate
message checking may be bypassed.
Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
(cherry picked from commit e89f3e85eb1c1d81294e5d430a91b0ba625e2ec0)
Diffstat (limited to 'target/linux/mediatek')
0 files changed, 0 insertions, 0 deletions