diff --git a/ChangeLog.md b/ChangeLog.md index 9819d05fbc1..5295310c72a 100644 --- a/ChangeLog.md +++ b/ChangeLog.md @@ -1,3 +1,9 @@ +# wolfSSL Release 5.1.1 (Jan 3rd, 2021) +Release 5.1.1 of wolfSSL embedded TLS has a high vulnerability fix: + +### Vulnerabilities +* \[High\] In connections using AES-CBC or DES3 with TLS/DTLS 1.2 or 1.1 the IV being used is not random. Users using wolfSSL version 5.0.0 or 5.1.0 doing TLS/DTLS 1.2 or 1.1 connections, without AEAD only, should update the version of wolfSSL used. + # wolfSSL Release 5.1.0 (Dec 27, 2021) Release 5.1.0 of wolfSSL embedded TLS has bug fixes and new features including: diff --git a/README b/README index af844349c56..1126e32669d 100644 --- a/README +++ b/README @@ -77,6 +77,12 @@ https://www.wolfssl.com/docs/security-vulnerabilities/ See INSTALL file for build instructions. More info can be found on-line at https://wolfssl.com/wolfSSL/Docs.html +# wolfSSL Release 5.1.1 (Jan 3rd, 2021) +Release 5.1.1 of wolfSSL embedded TLS has a high vulnerability fix: + +### Vulnerabilities +* \[High\] In connections using AES-CBC or DES3 with TLS/DTLS 1.2 or 1.1 the IV being used is not random. Users using wolfSSL version 5.0.0 or 5.1.0 doing TLS/DTLS 1.2 or 1.1 connections, without AEAD only, should update the version of wolfSSL used. + # wolfSSL Release 5.1.0 (Dec 27, 2021) Release 5.1.0 of wolfSSL embedded TLS has bug fixes and new features including: diff --git a/README.md b/README.md index f5d14b55631..69e945825e4 100644 --- a/README.md +++ b/README.md @@ -78,6 +78,12 @@ macro `NO_OLD_SHA_NAMES`. These names get mapped to the OpenSSL API for a single call hash function. Instead the name `WC_SHA`, `WC_SHA256`, `WC_SHA384` and `WC_SHA512` should be used for the enum name. +# wolfSSL Release 5.1.1 (Jan 3rd, 2021) +Release 5.1.1 of wolfSSL embedded TLS has a high vulnerability fix: + +### Vulnerabilities +* \[High\] In connections using AES-CBC or DES3 with TLS/DTLS 1.2 or 1.1 the IV being used is not random. Users using wolfSSL version 5.0.0 or 5.1.0 doing TLS/DTLS 1.2 or 1.1 connections, without AEAD only, should update the version of wolfSSL used. + # wolfSSL Release 5.1.0 (Dec 27, 2021) Release 5.1.0 of wolfSSL embedded TLS has bug fixes and new features including: diff --git a/wolfssl/wolfcrypt/types.h b/wolfssl/wolfcrypt/types.h index 0fbc45a74b3..5d17dfec73f 100644 --- a/wolfssl/wolfcrypt/types.h +++ b/wolfssl/wolfcrypt/types.h @@ -316,7 +316,7 @@ decouple library dependencies with standard string, memory and so on. #elif ((__GNUC__ > 7) || ((__GNUC__ == 7) && (__GNUC_MINOR__ >= 1))) #define FALL_THROUGH ; __attribute__ ((fallthrough)) #elif defined(__clang__) && defined(__clang_major__) && \ - (__clang_major__ >= 11) + (__clang_major__ >= 12) #define FALL_THROUGH ; __attribute__ ((fallthrough)) #endif #endif