openwrt/package
Eneas U de Queiroz 2393b09b59 wolfssl: bump to 5.2.0
Fixes two high-severity vulnerabilities:

- CVE-2022-25640: A TLS v1.3 server who requires mutual authentication
  can be bypassed.  If a malicious client does not send the
  certificate_verify message a client can connect without presenting a
  certificate even if the server requires one.

- CVE-2022-25638: A TLS v1.3 client attempting to authenticate a TLS
  v1.3 server can have its certificate heck bypassed. If the sig_algo in
  the certificate_verify message is different than the certificate
  message checking may be bypassed.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
(cherry picked from commit e89f3e85eb)
2022-04-11 22:44:17 +02:00
..
base-files OpenWrt v22.03: set branch defaults 2022-03-20 13:05:00 +00:00
boot arm-trusted-firmware-mediatek: remove no longer needed Configure step 2022-04-10 16:32:20 +01:00
devel strace: Update to version 5.16 2022-02-01 21:25:02 +01:00
firmware ipq40xx: update E2600AC c1/c2 board 2022-03-26 21:28:41 +01:00
kernel gpio-button-hotplug: fix data race 2022-04-10 16:26:01 +01:00
libs wolfssl: bump to 5.2.0 2022-04-11 22:44:17 +02:00
network dropbear: bump to 2022.82 2022-04-10 16:26:01 +01:00
system openwrt-keyring: fix broken install step 2022-03-27 11:48:31 +02:00
utils busybox: Fix snprintf arguments in lock 2022-04-05 23:33:16 +02:00
Makefile build: fix opkg install step for large package selection 2021-05-12 11:13:53 +02:00