aboutsummaryrefslogtreecommitdiffstats
path: root/package/libs/wolfssl/patches/200-ecc-rng.patch
diff options
context:
space:
mode:
authorPetr Štetiar <ynezz@true.cz>2022-09-28 11:28:06 +0200
committerPetr Štetiar <ynezz@true.cz>2022-09-29 07:36:19 +0200
commita596a8396b1ef23cd0eda22d9a628392e70e1e1a (patch)
treedc2b6fcd376285daf40ba6c4cef4a524bdc6ec2d /package/libs/wolfssl/patches/200-ecc-rng.patch
parent77d9cce604d32005ddb90e91c6cc9b9cf35068d7 (diff)
downloadupstream-a596a8396b1ef23cd0eda22d9a628392e70e1e1a.tar.gz
upstream-a596a8396b1ef23cd0eda22d9a628392e70e1e1a.tar.bz2
upstream-a596a8396b1ef23cd0eda22d9a628392e70e1e1a.zip
wolfssl: fix TLSv1.3 RCE in uhttpd by using latest 5.5.1-stable release
Fixes denial of service attack and buffer overflow against TLS 1.3 servers using session ticket resumption. When built with --enable-session-ticket and making use of TLS 1.3 server code in wolfSSL, there is the possibility of a malicious client to craft a malformed second ClientHello packet that causes the server to crash. This issue is limited to when using both --enable-session-ticket and TLS 1.3 on the server side. Users with TLS 1.3 servers, and having --enable-session-ticket, should update to the latest version of wolfSSL. Thanks to Max at Trail of Bits for the report and "LORIA, INRIA, France" for research on tlspuffin. Complete release notes https://github.com/wolfSSL/wolfssl/releases/tag/v5.5.1-stable Fixes: https://github.com/openwrt/luci/issues/5962 References: https://github.com/wolfSSL/wolfssl/issues/5629 Signed-off-by: Petr Štetiar <ynezz@true.cz>
Diffstat (limited to 'package/libs/wolfssl/patches/200-ecc-rng.patch')
0 files changed, 0 insertions, 0 deletions