Eneas U de Queiroz c5ef62a218 wolfssl: bump to 5.2.0
Fixes two high-severity vulnerabilities:

- CVE-2022-25640: A TLS v1.3 server who requires mutual authentication
  can be bypassed.  If a malicious client does not send the
  certificate_verify message a client can connect without presenting a
  certificate even if the server requires one.

- CVE-2022-25638: A TLS v1.3 client attempting to authenticate a TLS
  v1.3 server can have its certificate heck bypassed. If the sig_algo in
  the certificate_verify message is different than the certificate
  message checking may be bypassed.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
(cherry picked from commit e89f3e85eb1c1d81294e5d430a91b0ba625e2ec0)
2022-04-11 22:52:57 +02:00
..
2021-02-14 19:38:15 +01:00
2020-02-22 16:34:57 +01:00
2021-02-14 19:38:15 +01:00
2019-01-24 10:39:30 +01:00
2021-02-14 19:38:15 +01:00
2019-11-01 21:19:40 +01:00
2021-03-15 21:53:15 +00:00
2021-03-29 22:26:27 +02:00
2021-10-21 11:04:39 -10:00
2020-12-22 18:59:10 +01:00
2022-03-16 16:30:21 +01:00
2020-12-22 18:59:10 +01:00
2019-02-26 23:20:04 +01:00
2021-02-14 19:38:15 +01:00
2022-04-11 22:52:57 +02:00