Petr Štetiar ec8fb542ec wolfssl: fix TLSv1.3 RCE in uhttpd by using 5.5.1-stable (CVE-2022-39173)
Fixes denial of service attack and buffer overflow against TLS 1.3
servers using session ticket resumption. When built with
--enable-session-ticket and making use of TLS 1.3 server code in
wolfSSL, there is the possibility of a malicious client to craft a
malformed second ClientHello packet that causes the server to crash.

This issue is limited to when using both --enable-session-ticket and TLS
1.3 on the server side. Users with TLS 1.3 servers, and having
--enable-session-ticket, should update to the latest version of wolfSSL.

Thanks to Max at Trail of Bits for the report and "LORIA, INRIA, France"
for research on tlspuffin.

Complete release notes https://github.com/wolfSSL/wolfssl/releases/tag/v5.5.1-stable

Fixes: CVE-2022-39173
Fixes: https://github.com/openwrt/luci/issues/5962
References: https://github.com/wolfSSL/wolfssl/issues/5629
Tested-by: Kien Truong <duckientruong@gmail.com>
Reported-by: Kien Truong <duckientruong@gmail.com>
Signed-off-by: Petr Štetiar <ynezz@true.cz>
2022-09-29 07:53:56 +02:00
..
2022-08-06 19:58:46 +02:00
2021-02-14 19:38:15 +01:00
2022-09-06 16:36:40 +01:00
2022-09-11 01:30:11 +02:00
2021-02-14 19:38:15 +01:00
2022-07-04 20:37:41 +02:00
2022-09-06 16:36:44 +01:00
2022-09-06 16:36:45 +01:00
2022-08-28 18:29:10 +02:00
2022-09-06 16:36:41 +01:00
2022-09-06 16:36:48 +01:00
2022-09-06 16:36:48 +01:00
2022-07-10 19:07:47 +02:00
2022-09-07 04:22:40 +01:00
2022-08-28 12:37:54 +02:00
2022-03-19 17:42:29 +01:00
2022-09-06 16:34:26 +01:00
2022-07-07 21:22:36 +02:00
2022-04-16 14:02:11 +02:00
2022-08-28 18:29:10 +02:00
2022-08-31 23:25:39 +02:00
2022-08-09 08:08:08 +02:00