lede/package/libs/wolfssl
breakings 500ccda8fc
wolfssl: bump to 5.2.0 (#9240)
Fixes two high-severity vulnerabilities:

- CVE-2022-25640: A TLS v1.3 server who requires mutual authentication
  can be bypassed.  If a malicious client does not send the
  certificate_verify message a client can connect without presenting a
  certificate even if the server requires one.

- CVE-2022-25638: A TLS v1.3 client attempting to authenticate a TLS
  v1.3 server can have its certificate heck bypassed. If the sig_algo in
  the certificate_verify message is different than the certificate
  message checking may be bypassed.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>

Co-authored-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2022-04-12 12:02:05 +08:00
..
patches wolfssl: bump to 5.2.0 (#9240) 2022-04-12 12:02:05 +08:00
Config.in wolfssl: update to 5.1.1-stable (#8817) 2022-02-04 10:52:39 +08:00
Makefile wolfssl: bump to 5.2.0 (#9240) 2022-04-12 12:02:05 +08:00