notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
All times are UTC
Ukraine
non port: security/wolfssl/distinfo
SVNWeb

Number of commits found: 29

Sun, 26 Mar 2023
[ 09:14 Santhosh Raju (fox) search for other commits by this committer ]    commit hash:2b488f7b2f970f0dcf56c9054d86f11d06470004  commit hash:2b488f7b2f970f0dcf56c9054d86f11d06470004  commit hash:2b488f7b2f970f0dcf56c9054d86f11d06470004  2b488f7 
security/wolfssl: Update to v5.6.0

Changes since v5.5.4:

wolfSSL Release 5.6.0 (Mar 24, 2023)

Release 5.6.0 has been developed according to wolfSSL's development and QA
process (see link below) and successfully passed the quality
criteria.
https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance

NOTE: * --enable-heapmath is being deprecated and will be removed by 2024 * This
release makes ASN Template the default with ./configure, the previous ASN
parsing can be built with --enable-asn=original

Release 5.6.0 of wolfSSL embedded TLS has bug fixes and new features including:
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sat, 4 Feb 2023
[ 15:44 Santhosh Raju (fox) search for other commits by this committer ]    commit hash:2621a7fc635d4fbc955ec156fabbf26037f27a9c  commit hash:2621a7fc635d4fbc955ec156fabbf26037f27a9c  commit hash:2621a7fc635d4fbc955ec156fabbf26037f27a9c  2621a7fc 
security/wolfssl: Update to v5.5.4

Changes since v5.5.3:

wolfSSL Release 5.5.4 (Dec 21, 2022)

Release 5.5.4 of wolfSSL embedded TLS has bug fixes and new features including:

New Feature Additions

* QUIC related changes for HAProxy integration and config option
* Support for Analog Devices MAXQ1080 and MAXQ1065
* Testing and build of wolfSSL with NuttX
* New software based entropy gatherer with configure option
  --enable-entropy-memuseOP
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sat, 12 Nov 2022
[ 05:55 Santhosh Raju (fox) search for other commits by this committer ]    commit hash:e711537e2dc64236725736aceb40d72a4b6bc128  commit hash:e711537e2dc64236725736aceb40d72a4b6bc128  commit hash:e711537e2dc64236725736aceb40d72a4b6bc128  e711537 
security/wolfssl: Update to v5.5.3

Changes since v5.5.1:

wolfSSL Release 5.5.3 (Nov 2, 2022)

Release 5.5.3 of wolfSSL embedded TLS has the following bug fix:

Fixes

* Fix for possible buffer zeroization overrun introduced at the end of v5.5.2
  release cycle in GitHub pull request 5743
  (https://github.com/wolfSSL/wolfssl/pull/5743) and fixed in pull request 5757
  (https://github.com/wolfSSL/wolfssl/pull/5757). In the case where a specific
  memory allocation failed or a hardware fault happened there was the potential
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sat, 1 Oct 2022
[ 11:55 Santhosh Raju (fox) search for other commits by this committer ]    commit hash:44b4edac350261df25ca4153ed01148a94051d90  commit hash:44b4edac350261df25ca4153ed01148a94051d90  commit hash:44b4edac350261df25ca4153ed01148a94051d90  44b4eda 
security/wolfssl: Update to v5.5.1

Changes since v5.5.0:

wolfSSL Release 5.5.1 (Sep 28, 2022) Latest

Vulnerabilities
* [Med] Denial of service attack and buffer overflow against TLS 1.3 servers
  using session ticket resumption. When built with --enable-session-ticket and
  making use of TLS 1.3 server code in wolfSSL, there is the possibility of a
  malicious client to craft a malformed second ClientHello packet that causes
  the server to crash. This issue is limited to when using both
  --enable-session-ticket and TLS 1.3 on the server side. Users with TLS 1.3
  servers, and having --enable-session-ticket, should update to the latest
  version of wolfSSL. Thanks to Max at Trail of Bits for the report and
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sun, 4 Sep 2022
[ 08:43 Santhosh Raju (fox) search for other commits by this committer ]    commit hash:d915d5a4791539b1acb556c67489cacae3aae0af  commit hash:d915d5a4791539b1acb556c67489cacae3aae0af  commit hash:d915d5a4791539b1acb556c67489cacae3aae0af  d915d5a 
security/wolfssl: Update to v5.5.0

Changes since v5.4.0:

wolfSSL Release 5.5.0 (Aug 30, 2022)

Note:
** If not free’ing FP_ECC caches per thread by calling wc_ecc_fp_free there is
a
   possible memory leak during TLS 1.3 handshakes which use ECC. Users are urged
   to confirm they are free’ing FP_ECC caches per thread if enabled to avoid
   this issue.

Release 5.5.0 of wolfSSL embedded TLS has bug fixes and new features including:

Vulnerabilities
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Mon, 8 Aug 2022
[ 08:07 Santhosh Raju (fox) search for other commits by this committer ]    commit hash:4850ea1e3ca82f63f94654cf1b9790ec476bbb18  commit hash:4850ea1e3ca82f63f94654cf1b9790ec476bbb18  commit hash:4850ea1e3ca82f63f94654cf1b9790ec476bbb18  4850ea1 
security/wolfssl: Update to v5.4.0

Changes since v5.3.0:

wolfSSL Release 5.4.0 (July 11, 2022)

Note:
** Future releases of wolfSSL will turn off TLS 1.1 by default
** Release 5.4.0 made SP math the default math implementation. To make an
   equivalent build as –disable-fastmath from previous versions of wolfSSL,
now
   requires using the configure option –enable-heapmath instead.

Release 5.4.0 of wolfSSL embedded TLS has bug fixes and new features including:

Vulnerabilities
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sat, 7 May 2022
[ 11:43 Santhosh Raju (fox) search for other commits by this committer ]    commit hash:9819baefd0e561dd26087196faf9e477115f57b5  commit hash:9819baefd0e561dd26087196faf9e477115f57b5  commit hash:9819baefd0e561dd26087196faf9e477115f57b5  9819bae 
security/wolfssl: Update to v5.3.0

Changes since v5.2.0:

Release 5.3.0 of wolfSSL embedded TLS has bug fixes and new features including:

New Feature Additions
Ports

  * Updated support for Stunnel to version 5.61
  * Add i.MX8 NXP SECO use for secure private ECC keys and expand
    cryptodev-linux for use with the RSA/Curve25519 with the Linux CAAM driver
  * Allow encrypt then mac with Apache port
  * Update Renesas TSIP version to 1.15 on GR-ROSE and certificate signature
    data for TSIP / SCE example
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sat, 26 Feb 2022
[ 06:58 Santhosh Raju (fox) search for other commits by this committer ]    commit hash:ba4cf682d2070a74e78a093a250c5fdb2c4ce5fb  commit hash:ba4cf682d2070a74e78a093a250c5fdb2c4ce5fb  commit hash:ba4cf682d2070a74e78a093a250c5fdb2c4ce5fb  ba4cf68 
security/wolfssl: Update to v5.2.0

Changes since v5.1.1:

wolfSSL Release 5.2.0 (Feb 21, 2022)

Release 5.2.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities

  * [High] A TLS v1.3 server who requires mutual authentication can be
    bypassed. If a malicious client does not send the certificate_verify message
    a client can connect without presenting a certificate even if the server
    requires one. Thank you to Aina Toky Rasoamanana and Olivier Levillain of
    Télécom SudParis.
  * [High] A TLS v1.3 client attempting to authenticate a TLS v1.3 server can
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sat, 8 Jan 2022
[ 09:57 Santhosh Raju (fox) search for other commits by this committer ]    commit hash:91258b1619a5516664f1c36d5440d73af6696316  commit hash:91258b1619a5516664f1c36d5440d73af6696316  commit hash:91258b1619a5516664f1c36d5440d73af6696316  91258b1 
security/wolfssl: Update to v5.1.1

Changes since v5.1.0:

wolfSSL Release 5.1.1 (Jan 3rd, 2022)

Release 5.1.1 of wolfSSL embedded TLS has a high vulnerability fix:
Vulnerabilities

  * [High] In connections using AES-CBC or DES3 with TLS/DTLS 1.2 or 1.1 the IV
    being used is not random. Users using wolfSSL version 5.0.0 or 5.1.0 doing
    TLS/DTLS 1.2 or 1.1 connections, without AEAD only, should update the
    version of wolfSSL used.
Thu, 30 Dec 2021
[ 01:26 Santhosh Raju (fox) search for other commits by this committer ]    commit hash:677f4c2bf26ab6f81b00c68714b807b2faaf9c89  commit hash:677f4c2bf26ab6f81b00c68714b807b2faaf9c89  commit hash:677f4c2bf26ab6f81b00c68714b807b2faaf9c89  677f4c2 
security/wolfssl: Update to v5.1.0

Changes since v5.0.0:

wolfSSL Release 5.1.0 (Dec 27, 2021)

Release 5.1.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities

  * [Low] Potential for DoS attack on a wolfSSL client due to processing hello
    packets of the incorrect side. This affects only connections using TLS v1.2
    or less that have also been compromised by a man in the middle
    attack. Thanks to James Henderson, Mathy Vanhoef, Chris M. Stone, Sam
    L. Thomas, Nicolas Bailleut, and Tom Chothia (University of Birmingham, KU
    Leuven, ENS Rennes for the report.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sat, 6 Nov 2021
[ 04:57 Santhosh Raju (fox) search for other commits by this committer ]    commit hash:71c26f55a13dc607c421cf1de326d079e5ee7b0d  commit hash:71c26f55a13dc607c421cf1de326d079e5ee7b0d  commit hash:71c26f55a13dc607c421cf1de326d079e5ee7b0d  71c26f5 
security/wolfssl: Update to v5.0.0

Changes since v4.8.1:

wolfSSL Release 5.0.0 (Nov 01, 2021)

Release 5.0.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities

  * [\Low] Hang with DSA signature creation when a specific q value is used in a
    maliciously crafted key. If a DSA key with an invalid q value of either 1 or
    0 was decoded and used for creating a signature, it would result in a hang
    in wolfSSL. Users that are creating signatures with DSA and are using keys
    supplied from an outside source are affected.
  * [\Low] Issue with incorrectly validating a certificate that has multiple
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sat, 24 Jul 2021
[ 04:49 Santhosh Raju (fox) search for other commits by this committer ]    commit hash:e4b770114494f3d54409aef6bd23a3a2def34399  commit hash:e4b770114494f3d54409aef6bd23a3a2def34399  commit hash:e4b770114494f3d54409aef6bd23a3a2def34399  e4b7701 
security/wolfssl: Updates to v4.8.1

Changes since v4.8.0:

wolfSSL Release 4.8.1 (July 16, 2021)

Release 4.8.1 of wolfSSL embedded TLS has an OCSP vulnerability fix:
Vulnerabilities

  * [High] OCSP verification issue when response is for a certificate with no
    relation to the chain in question BUT that response contains the NoCheck
    extension which effectively disables ALL verification of that one cert.
    Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS
    server users doing mutual auth with OCSP, and CertManager users doing OCSP
    independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum
    and Alissa Kim of Volkswagen Infotainment for the report.
Thu, 15 Jul 2021
[ 04:40 Santhosh Raju (fox) search for other commits by this committer ]    commit hash:711845c3350aee3b7cad8283fea81ec69531d8f3  commit hash:711845c3350aee3b7cad8283fea81ec69531d8f3  commit hash:711845c3350aee3b7cad8283fea81ec69531d8f3  711845c 
security/wolfssl: Updates to v4.8.0

Changes since v4.7.0:

wolfSSL Release 4.8.0 (July 09, 2021)

Release 4.8.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities

  * [Low] OCSP request/response verification issue. In the case that the serial
    number in the OCSP request differs from the serial number in the OCSP
    response the error from the comparison was not resulting in a failed
    verification. We recommend users that have wolfSSL version 4.6.0 and 4.7.0
    with OCSP enabled update their version of wolfSSL. Version 4.5.0 and earlier
    are not affected by this report. Thanks to Rainer, Roee, Barak, Hila and
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Mon, 8 Mar 2021
[ 04:10 fox search for other commits by this committer ] Original commit   Revision:567824
security/wolfssl: Updates to v4.7.0

- Remove the memory leak patch since now it is upstreamed.

Changes since v4.6.0:

wolfSSL Release 4.7.0 (February 16, 2021)

Release 4.7.0 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions

  * Compatibility Layer expansion SSL_get_verify_mode, X509_VERIFY_PARAM API,
    X509_STORE_CTX API added
  * WOLFSSL_PSK_IDENTITY_ALERT macro added for enabling a subset of TLS alerts
  * Function wolfSSL_CTX_NoTicketTLSv12 added to enable turning off session
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Mon, 28 Dec 2020
[ 16:44 fox search for other commits by this committer ] Original commit   Revision:559504
security/wolfssl: Updates to v4.6.0

Changes since v4.5.0:

wolfSSL Release 4.6.0 (December 22, 2020)

Release 4.6.0 of wolfSSL embedded TLS has bug fixes and new features including:

New Feature Additions

New Build Options

  * wolfSSL now enables linux kernel module support. Big news for Linux kernel
    module developers with crypto requirements! wolfCrypt and wolfSSL are now
    loadable as modules in the Linux kernel, providing the entire libwolfssl
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Tue, 17 Nov 2020
[ 16:06 pkubaj search for other commits by this committer ] Original commit   Revision:555565
security/wolfssl: fix build on big-endian

Merge upstream patch to fix build on big-endian architectures.

Also unmark mips and mips64 as broken, now builds fine.

MFH:		2020Q4 (fix build blanket)
Sat, 22 Aug 2020
[ 01:23 fox search for other commits by this committer ] Original commit   Revision:545732
security/wolfssl: Updates to v4.5.0

Changes since v4.4.0:

wolfSSL Release 4.5.0 (August 19, 2020)

If you have questions about this release, feel free to contact us on our
info@ address.

Release 4.5.0 of wolfSSL embedded TLS has bug fixes and new features including:

New Feature Additions

* Added Xilinx Vitis 2019.2 example and README updates
* TLS v1.3 is now enabled by default
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Thu, 23 Apr 2020
[ 19:18 fox search for other commits by this committer ] Original commit   Revision:532705
security/wolfssl: Updates to v4.4.0

Changes since v4.3.0:

wolfSSL Release 4.4.0 (04/22/2020)

If you have questions about this release, feel free to contact us on our
info@ address.

Release 4.4.0 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions

  * Hexagon support.
  * DSP builds to offload ECC verify operations.
  * Certificate Manager callback support.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sun, 26 Jan 2020
[ 05:27 fox search for other commits by this committer ] Original commit   Revision:524152
security/wolfssl: Updates to 4.3.0

- Minor portlint / portfmt fixes.
- Take ownership of the port.

Changes:	https://www.wolfssl.com/docs/wolfssl-changelog/
PR:		242853
Submitted by:	takefu@airport.fm
Reviewed by:	philip
Fri, 13 Dec 2019
[ 12:20 amdmi3 search for other commits by this committer ] Original commit   Revision:520026
- Update to 4.2.0
- Fix LICENSE
- Add LICENSE_FILE
- Add testing support

PR:		233190
Submitted by:	takefu@airport.fm
Mon, 25 Dec 2017
[ 11:47 johans search for other commits by this committer ] Original commit   Revision:457220
Update to WolfSSL 3.13.0
https://www.wolfssl.com/docs/wolfssl-changelog/
Tue, 21 Nov 2017
[ 21:15 johans search for other commits by this committer ] Original commit   Revision:454654
Update to WolfSSL 3.12
https://www.wolfssl.com/docs/wolfssl-changelog/
Tue, 9 May 2017
[ 19:05 johans search for other commits by this committer ] Original commit   Revision:440511
Update to latest release (4 May); bugfixes and new features
https://www.wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html
Tue, 27 Dec 2016
[ 10:24 johans search for other commits by this committer ] Original commit   Revision:429595
Update to WolfSSL 3.10
Configure script now uses bash-isms
Mon, 12 Sep 2016
[ 20:30 johans search for other commits by this committer ] Original commit   Revision:421959
Update to WolfSSL 3.9.8
Tue, 26 Apr 2016
[ 20:58 johans search for other commits by this committer ] Original commit   Revision:414076
Update to WolfSSL 3.9.0
https://www.wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html
Wed, 6 Jan 2016
[ 21:32 johans search for other commits by this committer ] Original commit   Revision:405390
- Update WolfSSL to 3.8.0 (new MASTER_SITES, WWW entry and description)
- Includes important security fixes for CVE-2015-7744 and CVE-2015-6925
  see
https://www.wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html
- Disables support for SSLv3

PR:		205936
Submitted by:	Christoph Moench-Tegeder <cmt@burggraben.net>
MFH:		2016Q1
Thu, 30 Apr 2015
[ 19:41 johans search for other commits by this committer ] Original commit   Revision:385058
- Update to WolfSSL 3.4.6
- Remove options to include ChaCha and Poly1305, these are now on by default
Sat, 28 Mar 2015
[ 09:15 johans search for other commits by this committer ] Original commit   Revision:382450
CyaSSL has been renamed WolfSSL upstream
Rename port and update to 3.4.0
http://www.yassl.com/yaSSL/Products-wolfssl.html

Number of commits found: 29