forked from wolfSSL/wolfssl
revert changes to match 4.8.1 bundle
This commit is contained in:
@ -2,7 +2,7 @@
|
||||
Release 4.8.1 of wolfSSL embedded TLS has an OCSP vulnerability fix:
|
||||
|
||||
### Vulnerabilities
|
||||
* [High] OCSP verification issue when response is for a certificate with no relation to the chain in question BUT that response contains the NoCheck extension which effectively disables ALL verification of that one cert. Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS server users doing mutual auth with OCSP, and CertManager users doing OCSP independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum and Alissa Kim of Volkswagen Infotainment for the report.
|
||||
* [High] OCSP verification issue when response is for a certificate with no relation to the chain in question BUT that response contains the NoCheck extension which effectively disables ALL verification of that one cert. Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS server users doing mutual auth with OCSP, and CertManager users doing OCSP independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum and Alissa Kim for the report.
|
||||
|
||||
|
||||
# wolfSSL Release 4.8.0 (July 09, 2021)
|
||||
|
@ -9,7 +9,7 @@ CC = qcc -Vgcc_nto$(PLATFORM)
|
||||
CXX = qcc -lang-c++ -Vgcc_nto$(PLATFORM)
|
||||
LD = $(CC)
|
||||
|
||||
INCLUDES += -I../../../ -I../../../wolfssl/wolfcrypt/port/caam/
|
||||
INCLUDES += -I../../../wolfssl/wolfcrypt/port/caam/
|
||||
CCFLAGS += -O2 -Wall
|
||||
|
||||
SRCS = \
|
||||
|
2
README
2
README
@ -76,7 +76,7 @@ should be used for the enum name.
|
||||
Release 4.8.1 of wolfSSL embedded TLS has an OCSP vulnerability fix:
|
||||
|
||||
### Vulnerabilities
|
||||
* [High] OCSP verification issue when response is for a certificate with no relation to the chain in question BUT that response contains the NoCheck extension which effectively disables ALL verification of that one cert. Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS server users doing mutual auth with OCSP, and CertManager users doing OCSP independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum and Alissa Kim of Volkswagen Infotainment for the report.
|
||||
* [High] OCSP verification issue when response is for a certificate with no relation to the chain in question BUT that response contains the NoCheck extension which effectively disables ALL verification of that one cert. Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS server users doing mutual auth with OCSP, and CertManager users doing OCSP independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum and Alissa Kim for the report.
|
||||
|
||||
|
||||
# wolfSSL Release 4.8.0 (July 09, 2021)
|
||||
|
@ -80,7 +80,7 @@ WC_SHA512 should be used for the enum name.
|
||||
Release 4.8.1 of wolfSSL embedded TLS has an OCSP vulnerability fix:
|
||||
|
||||
### Vulnerabilities
|
||||
* [High] OCSP verification issue when response is for a certificate with no relation to the chain in question BUT that response contains the NoCheck extension which effectively disables ALL verification of that one cert. Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS server users doing mutual auth with OCSP, and CertManager users doing OCSP independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum and Alissa Kim of Volkswagen Infotainment for the report.
|
||||
* [High] OCSP verification issue when response is for a certificate with no relation to the chain in question BUT that response contains the NoCheck extension which effectively disables ALL verification of that one cert. Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS server users doing mutual auth with OCSP, and CertManager users doing OCSP independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum and Alissa Kim for the report.
|
||||
|
||||
# wolfSSL Release 4.8.0 (July 09, 2021)
|
||||
Release 4.8.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||
|
@ -74,7 +74,7 @@ mkdir -p $RPM_BUILD_ROOT/
|
||||
%{_libdir}/libwolfssl.la
|
||||
%{_libdir}/libwolfssl.so
|
||||
%{_libdir}/libwolfssl.so.24
|
||||
%{_libdir}/libwolfssl.so.24.5.0
|
||||
%{_libdir}/libwolfssl.so.24.5.1
|
||||
|
||||
%files devel
|
||||
%defattr(-,root,root,-)
|
||||
|
@ -20,7 +20,6 @@
|
||||
*/
|
||||
|
||||
#include "caam_driver.h"
|
||||
#include "wolfssl/version.h"
|
||||
|
||||
#include <errno.h>
|
||||
#include <stdio.h>
|
||||
@ -1191,9 +1190,8 @@ static int getSupported(char* in)
|
||||
#endif
|
||||
|
||||
char cannedResponse[] = {
|
||||
"wolfCrypt QNX CAAM driver version "
|
||||
LIBWOLFSSL_VERSION_STRING
|
||||
"\nSupports:\n"
|
||||
"wolfCrypt QNX CAAM driver version 4.8.1\n"
|
||||
"Supports:\n"
|
||||
"\tAES-CMAC\n"
|
||||
"\tECC (sign, verify, ecdh, keygen)\n"
|
||||
"\tBlobs (black and red)\n"
|
||||
|
Reference in New Issue
Block a user