In wolfSSL before 5.2.0, certificate validation may be bypassed during attempted authentication by a TLS 1.3 client to a TLS 1.3 server. This occurs when the sigalgo field differs between the certificateverify message and the certificate message.
{ "binaries": [ { "binary_version": "3.4.8+dfsg-1", "binary_name": "libcyassl5" }, { "binary_version": "3.4.8+dfsg-1", "binary_name": "libwolfssl-dev" }, { "binary_version": "3.4.8+dfsg-1", "binary_name": "libwolfssl0" } ] }
{ "binaries": [ { "binary_version": "3.13.0+dfsg-1", "binary_name": "libwolfssl-dev" }, { "binary_version": "3.13.0+dfsg-1", "binary_name": "libwolfssl15" } ] }
{ "binaries": [ { "binary_version": "4.3.0+dfsg-2", "binary_name": "libwolfssl-dev" }, { "binary_version": "4.3.0+dfsg-2", "binary_name": "libwolfssl24" } ] }
{ "binaries": [ { "binary_version": "5.2.0-2", "binary_name": "libwolfssl-dev" }, { "binary_version": "5.2.0-2", "binary_name": "libwolfssl32" } ] }