diff options
author | Hauke Mehrtens <hauke@hauke-m.de> | 2020-08-24 12:11:29 +0200 |
---|---|---|
committer | Hauke Mehrtens <hauke@hauke-m.de> | 2020-08-26 23:29:30 +0200 |
commit | 00722a720c778e623d6f37af3a3b4e43b29c3fe8 (patch) | |
tree | 41e6c647d7bb37757f5817155c5fb4b4467798a8 /tools/mtd-utils/patches/320-mkfs.jffs2-SOURCE_DATE_EPOCH.patch | |
parent | 2745f6afe6ee0ef1665f04fd9b9fb1fd33d7b65e (diff) | |
download | upstream-00722a720c778e623d6f37af3a3b4e43b29c3fe8.tar.gz upstream-00722a720c778e623d6f37af3a3b4e43b29c3fe8.tar.bz2 upstream-00722a720c778e623d6f37af3a3b4e43b29c3fe8.zip |
wolfssl: Update to version 4.5.0
This fixes the following security problems:
* In earlier versions of wolfSSL there exists a potential man in the
middle attack on TLS 1.3 clients.
* Denial of service attack on TLS 1.3 servers from repetitively sending
ChangeCipherSpecs messages. (CVE-2020-12457)
* Potential cache timing attacks on public key operations in builds that
are not using SP (single precision). (CVE-2020-15309)
* When using SGX with EC scalar multiplication the possibility of side-
channel attacks are present.
* Leak of private key in the case that PEM format private keys are
bundled in with PEM certificates into a single file.
* During the handshake, clear application_data messages in epoch 0 are
processed and returned to the application.
Full changelog:
https://www.wolfssl.com/docs/wolfssl-changelog/
Fix a build error on big endian systems by backporting a pull request:
https://github.com/wolfSSL/wolfssl/pull/3255
The size of the ipk increases on mips BE by 1.4%
old:
libwolfssl24_4.4.0-stable-2_mips_24kc.ipk: 386246
new:
libwolfssl24_4.5.0-stable-1_mips_24kc.ipk: 391528
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Diffstat (limited to 'tools/mtd-utils/patches/320-mkfs.jffs2-SOURCE_DATE_EPOCH.patch')
0 files changed, 0 insertions, 0 deletions