In wolfSSL before 5.2.0, certificate validation may be bypassed during attempted authentication by a TLS 1.3 client to a TLS 1.3 server. This occurs when the sigalgo field differs between the certificateverify message and the certificate message.
{ "binaries": [ { "binary_name": "libcyassl5", "binary_version": "3.4.8+dfsg-1" }, { "binary_name": "libwolfssl-dev", "binary_version": "3.4.8+dfsg-1" }, { "binary_name": "libwolfssl0", "binary_version": "3.4.8+dfsg-1" } ] }
{ "binaries": [ { "binary_name": "libwolfssl-dev", "binary_version": "3.13.0+dfsg-1" }, { "binary_name": "libwolfssl15", "binary_version": "3.13.0+dfsg-1" } ] }
{ "binaries": [ { "binary_name": "libwolfssl-dev", "binary_version": "4.3.0+dfsg-2" }, { "binary_name": "libwolfssl24", "binary_version": "4.3.0+dfsg-2" } ] }
{ "binaries": [ { "binary_name": "libwolfssl-dev", "binary_version": "5.2.0-2" }, { "binary_name": "libwolfssl32", "binary_version": "5.2.0-2" } ] }