diff --git a/ChangeLog.md b/ChangeLog.md index 08f967e02..5093899ac 100644 --- a/ChangeLog.md +++ b/ChangeLog.md @@ -2,7 +2,7 @@ Release 4.8.1 of wolfSSL embedded TLS has an OCSP vulnerability fix: ### Vulnerabilities -* [High] OCSP verification issue when response is for a certificate with no relation to the chain in question BUT that response contains the NoCheck extension which effectively disables ALL verification of that one cert. Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS server users doing mutual auth with OCSP, and CertManager users doing OCSP independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum and Alissa Kim of Volkswagen Infotainment for the report. +* [High] OCSP verification issue when response is for a certificate with no relation to the chain in question BUT that response contains the NoCheck extension which effectively disables ALL verification of that one cert. Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS server users doing mutual auth with OCSP, and CertManager users doing OCSP independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum and Alissa Kim for the report. # wolfSSL Release 4.8.0 (July 09, 2021) diff --git a/IDE/QNX/CAAM-DRIVER/Makefile b/IDE/QNX/CAAM-DRIVER/Makefile index 27a9563cc..5e08b4724 100644 --- a/IDE/QNX/CAAM-DRIVER/Makefile +++ b/IDE/QNX/CAAM-DRIVER/Makefile @@ -9,7 +9,7 @@ CC = qcc -Vgcc_nto$(PLATFORM) CXX = qcc -lang-c++ -Vgcc_nto$(PLATFORM) LD = $(CC) -INCLUDES += -I../../../ -I../../../wolfssl/wolfcrypt/port/caam/ +INCLUDES += -I../../../wolfssl/wolfcrypt/port/caam/ CCFLAGS += -O2 -Wall SRCS = \ diff --git a/README b/README index 4fc3ba51e..6bb1257a1 100644 --- a/README +++ b/README @@ -76,7 +76,7 @@ should be used for the enum name. Release 4.8.1 of wolfSSL embedded TLS has an OCSP vulnerability fix: ### Vulnerabilities -* [High] OCSP verification issue when response is for a certificate with no relation to the chain in question BUT that response contains the NoCheck extension which effectively disables ALL verification of that one cert. Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS server users doing mutual auth with OCSP, and CertManager users doing OCSP independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum and Alissa Kim of Volkswagen Infotainment for the report. +* [High] OCSP verification issue when response is for a certificate with no relation to the chain in question BUT that response contains the NoCheck extension which effectively disables ALL verification of that one cert. Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS server users doing mutual auth with OCSP, and CertManager users doing OCSP independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum and Alissa Kim for the report. # wolfSSL Release 4.8.0 (July 09, 2021) diff --git a/README.md b/README.md index 8fc7ca7a6..f09c906fd 100644 --- a/README.md +++ b/README.md @@ -80,7 +80,7 @@ WC_SHA512 should be used for the enum name. Release 4.8.1 of wolfSSL embedded TLS has an OCSP vulnerability fix: ### Vulnerabilities -* [High] OCSP verification issue when response is for a certificate with no relation to the chain in question BUT that response contains the NoCheck extension which effectively disables ALL verification of that one cert. Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS server users doing mutual auth with OCSP, and CertManager users doing OCSP independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum and Alissa Kim of Volkswagen Infotainment for the report. +* [High] OCSP verification issue when response is for a certificate with no relation to the chain in question BUT that response contains the NoCheck extension which effectively disables ALL verification of that one cert. Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS server users doing mutual auth with OCSP, and CertManager users doing OCSP independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum and Alissa Kim for the report. # wolfSSL Release 4.8.0 (July 09, 2021) Release 4.8.0 of wolfSSL embedded TLS has bug fixes and new features including: diff --git a/rpm/spec.in b/rpm/spec.in index 5d26095f7..42a48fb22 100644 --- a/rpm/spec.in +++ b/rpm/spec.in @@ -74,7 +74,7 @@ mkdir -p $RPM_BUILD_ROOT/ %{_libdir}/libwolfssl.la %{_libdir}/libwolfssl.so %{_libdir}/libwolfssl.so.24 -%{_libdir}/libwolfssl.so.24.5.0 +%{_libdir}/libwolfssl.so.24.5.1 %files devel %defattr(-,root,root,-) diff --git a/wolfcrypt/src/port/caam/caam_qnx.c b/wolfcrypt/src/port/caam/caam_qnx.c index 8b436040c..d7e9908d4 100644 --- a/wolfcrypt/src/port/caam/caam_qnx.c +++ b/wolfcrypt/src/port/caam/caam_qnx.c @@ -20,7 +20,6 @@ */ #include "caam_driver.h" -#include "wolfssl/version.h" #include #include @@ -1191,9 +1190,8 @@ static int getSupported(char* in) #endif char cannedResponse[] = { - "wolfCrypt QNX CAAM driver version " - LIBWOLFSSL_VERSION_STRING - "\nSupports:\n" + "wolfCrypt QNX CAAM driver version 4.8.1\n" + "Supports:\n" "\tAES-CMAC\n" "\tECC (sign, verify, ecdh, keygen)\n" "\tBlobs (black and red)\n"