Wangle's AcceptRoutingHandler incorrectly casts a socket when accepting a TLS 1.3 connection, leading to a potential denial of service attack against systems accepting such connections. This affects versions of Wangle prior to v2019.01.14.00
[
{
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"digest": {
"line_hashes": [
"268567030348751751453384736220707327668",
"45614140593589482060699952486874529920",
"236502510683045154816125009418150650393",
"93722895799433445678815133214348433008",
"282140031409919973459169982301869641585"
],
"threshold": 0.9
},
"id": "CVE-2019-3554-43196e7a",
"source": "https://github.com/facebook/wangle/commit/3b17ba10a82c71e7808760e027ac6af687e06074",
"target": {
"file": "wangle/bootstrap/AcceptRoutingHandler-inl.h"
}
}
]