openwrt/package
Petr Štetiar ce59843662 wolfssl: fix TLSv1.3 RCE in uhttpd by using 5.5.1-stable (CVE-2022-39173)
Fixes denial of service attack and buffer overflow against TLS 1.3
servers using session ticket resumption. When built with
--enable-session-ticket and making use of TLS 1.3 server code in
wolfSSL, there is the possibility of a malicious client to craft a
malformed second ClientHello packet that causes the server to crash.

This issue is limited to when using both --enable-session-ticket and TLS
1.3 on the server side. Users with TLS 1.3 servers, and having
--enable-session-ticket, should update to the latest version of wolfSSL.

Thanks to Max at Trail of Bits for the report and "LORIA, INRIA, France"
for research on tlspuffin.

Complete release notes https://github.com/wolfSSL/wolfssl/releases/tag/v5.5.1-stable

Fixes: CVE-2022-39173
Fixes: https://github.com/openwrt/luci/issues/5962
References: https://github.com/wolfSSL/wolfssl/issues/5629
Tested-by: Kien Truong <duckientruong@gmail.com>
Reported-by: Kien Truong <duckientruong@gmail.com>
Signed-off-by: Petr Štetiar <ynezz@true.cz>
(cherry picked from commit ec8fb542ec)
2022-10-04 10:11:08 +02:00
..
base-files OpenWrt v22.03.0: revert to branch defaults 2022-09-03 18:49:08 +02:00
boot uboot-mvebu: backport LibreSSL patches for older version of LibreSSL 2022-10-03 19:51:50 +02:00
devel strace: Update to version 5.16 2022-02-01 21:25:02 +01:00
firmware firmware: intel-microcode: update to 20220809 2022-10-03 19:51:50 +02:00
kernel build: fix issues with targets installed via feeds 2022-09-27 13:45:03 +02:00
libs wolfssl: fix TLSv1.3 RCE in uhttpd by using 5.5.1-stable (CVE-2022-39173) 2022-10-04 10:11:08 +02:00
network hostapd: rename hostapd multicast_to_unicast option to multicast_to_unicast_all 2022-09-06 12:18:52 +02:00
system rpcd: bump version to 2022-08-24 2022-08-25 11:05:20 +02:00
utils ucode: update to latest Git HEAD 2022-08-31 23:06:01 +02:00
Makefile build: fix opkg install step for large package selection 2021-05-12 11:13:53 +02:00