diff options
author | Petr Štetiar <ynezz@true.cz> | 2022-09-28 11:28:06 +0200 |
---|---|---|
committer | Petr Štetiar <ynezz@true.cz> | 2022-10-05 21:09:48 +0200 |
commit | 914d91274162ba7e125fcfc781b1128b7c42a856 (patch) | |
tree | fb6d49b746822ff324cfcd5815976bd6c22fd926 /package/kernel/broadcom-wl/files/lib | |
parent | 4be7eb7735453a6b1f578942afccc5f742c9d8d8 (diff) | |
download | upstream-914d91274162ba7e125fcfc781b1128b7c42a856.tar.gz upstream-914d91274162ba7e125fcfc781b1128b7c42a856.tar.bz2 upstream-914d91274162ba7e125fcfc781b1128b7c42a856.zip |
wolfssl: fix TLSv1.3 RCE in uhttpd by using 5.5.1-stable (CVE-2022-39173)
Fixes denial of service attack and buffer overflow against TLS 1.3
servers using session ticket resumption. When built with
--enable-session-ticket and making use of TLS 1.3 server code in
wolfSSL, there is the possibility of a malicious client to craft a
malformed second ClientHello packet that causes the server to crash.
This issue is limited to when using both --enable-session-ticket and TLS
1.3 on the server side. Users with TLS 1.3 servers, and having
--enable-session-ticket, should update to the latest version of wolfSSL.
Thanks to Max at Trail of Bits for the report and "LORIA, INRIA, France"
for research on tlspuffin.
Complete release notes https://github.com/wolfSSL/wolfssl/releases/tag/v5.5.1-stable
Fixes: CVE-2022-39173
Fixes: https://github.com/openwrt/luci/issues/5962
References: https://github.com/wolfSSL/wolfssl/issues/5629
Tested-by: Kien Truong <duckientruong@gmail.com>
Reported-by: Kien Truong <duckientruong@gmail.com>
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit ec8fb542ec3e4f584444a97de5ac05dbc2a9cde5)
(cherry picked from commit ce59843662961049a28033077587cabdc5243b15)
Diffstat (limited to 'package/kernel/broadcom-wl/files/lib')
0 files changed, 0 insertions, 0 deletions