Eneas U de Queiroz e89f3e85eb wolfssl: bump to 5.2.0
Fixes two high-severity vulnerabilities:

- CVE-2022-25640: A TLS v1.3 server who requires mutual authentication
  can be bypassed.  If a malicious client does not send the
  certificate_verify message a client can connect without presenting a
  certificate even if the server requires one.

- CVE-2022-25638: A TLS v1.3 client attempting to authenticate a TLS
  v1.3 server can have its certificate heck bypassed. If the sig_algo in
  the certificate_verify message is different than the certificate
  message checking may be bypassed.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2022-04-11 21:41:03 +02:00
..
2021-02-14 19:38:15 +01:00
2020-02-22 16:34:57 +01:00
2022-02-01 21:25:02 +01:00
2021-02-14 19:38:15 +01:00
2022-04-09 18:34:04 +02:00
2021-12-01 00:39:26 +02:00
2019-11-01 21:19:40 +01:00
2021-10-31 13:01:24 +00:00
2021-11-20 17:48:49 +00:00
2021-12-21 21:37:05 +02:00
2022-03-19 17:42:29 +01:00
2021-12-21 21:36:55 +02:00
2019-02-26 23:20:04 +01:00
2022-04-11 21:41:03 +02:00