Hauke Mehrtens 3a0232ffd3 wolfssl: Update to version 5.7.2
This fixes multiple security problems:
 * [Medium] CVE-2024-1544
   Potential ECDSA nonce side channel attack in versions of wolfSSL before 5.6.6 with wc_ecc_sign_hash calls.

 * [Medium] CVE-2024-5288
   A private key blinding operation, enabled by defining the macro WOLFSSL_BLIND_PRIVATE_KEY, was added to mitigate a potential row hammer attack on ECC operations.

 * [Low] When parsing a provided maliciously crafted certificate directly using wolfSSL API, outside of a TLS connection, a certificate with an excessively large number of extensions could lead to a potential DoS.

 * [Low] CVE-2024-5991
   In the function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked.

 * [Medium] CVE-2024-5814
   A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection.

 * [Medium] OCSP stapling version 2 response verification bypass issue when a crafted response of length 0 is received.

 * [Medium] OCSP stapling version 2 revocation bypass with a retry of a TLS connection attempt.

Unset DISABLE_NLS to prevent setting the unsupported configuration
option --disable-nls which breaks the build now.

Link: https://github.com/openwrt/openwrt/pull/15948
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2024-07-15 23:57:44 +02:00
..
2023-10-17 11:05:16 +02:00
2024-06-08 14:21:40 +02:00
2024-01-30 10:39:21 +01:00
2023-05-22 18:51:31 +02:00
2023-10-12 09:50:25 +02:00
2022-09-06 16:36:44 +01:00
2022-09-06 16:36:45 +01:00
2023-07-18 14:37:19 +02:00
2024-01-04 16:06:44 +01:00
2023-10-29 19:42:32 +01:00
2022-07-10 19:07:47 +02:00
2024-01-25 17:31:50 +01:00
2024-05-05 21:45:52 +02:00
2024-05-31 10:33:06 +02:00
2024-01-04 22:40:05 +01:00
2024-07-10 12:53:27 +02:00
2023-07-19 15:25:35 +02:00
2024-04-27 12:05:43 +02:00
2023-09-25 23:06:33 +02:00
2024-07-15 23:57:44 +02:00
2024-02-02 17:26:29 +01:00