lede/package
breakings 500ccda8fc
wolfssl: bump to 5.2.0 (#9240)
Fixes two high-severity vulnerabilities:

- CVE-2022-25640: A TLS v1.3 server who requires mutual authentication
  can be bypassed.  If a malicious client does not send the
  certificate_verify message a client can connect without presenting a
  certificate even if the server requires one.

- CVE-2022-25638: A TLS v1.3 client attempting to authenticate a TLS
  v1.3 server can have its certificate heck bypassed. If the sig_algo in
  the certificate_verify message is different than the certificate
  message checking may be bypassed.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>

Co-authored-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2022-04-12 12:02:05 +08:00
..
base-files Revert "base-file: remove password aging feature form /etc/shadow" 2022-02-25 23:17:10 +08:00
boot grub2: add missing license (#9196) 2022-04-06 15:10:03 +08:00
devel gdb: Update gdb to version 11.2 (#8954) 2022-02-27 01:50:07 +08:00
firmware Add basic support for TL-XTR10890 (#9202) 2022-04-07 22:49:43 +08:00
kernel kmod-fs-nfs:refresh depends 2022-04-12 11:20:55 +08:00
lean automount: skip some partition 2022-04-03 13:24:18 +08:00
libs wolfssl: bump to 5.2.0 (#9240) 2022-04-12 12:02:05 +08:00
network bridger: add bridge forwarding accelerator 2022-04-07 00:06:09 +08:00
qca ipq807x: add qca-nss-drv-bridge-mgr and qca-nss-drv-vlan-mgr 2022-04-11 14:04:33 +08:00
system openwrt-keyring: add OpenWrt 22.03 GPG/usign keys (#9128) 2022-03-25 23:00:09 +08:00
utils ucode: update to latest Git HEAD (#9230) 2022-04-12 11:26:17 +08:00
Makefile add kernel 5.10 support and sync with upstream 2021-06-14 18:30:08 +08:00