Wangle's AcceptRoutingHandler incorrectly casts a socket when accepting a TLS 1.3 connection, leading to a potential denial of service attack against systems accepting such connections. This affects versions of Wangle prior to v2019.01.14.00
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-3554.json"
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"268567030348751751453384736220707327668",
"45614140593589482060699952486874529920",
"236502510683045154816125009418150650393",
"93722895799433445678815133214348433008",
"282140031409919973459169982301869641585"
]
},
"source": "https://github.com/facebook/wangle/commit/3b17ba10a82c71e7808760e027ac6af687e06074",
"target": {
"file": "wangle/bootstrap/AcceptRoutingHandler-inl.h"
},
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2019-3554-43196e7a",
"signature_version": "v1"
}
]