An issue was discovered in the DTLS handshake implementation in wolfSSL before 4.5.0. Clear DTLS application_data messages in epoch 0 do not produce an out-of-order error. Instead, these messages are returned to the application.
{ "binaries": [ { "binary_name": "libcyassl5", "binary_version": "3.4.8+dfsg-1" }, { "binary_name": "libwolfssl-dev", "binary_version": "3.4.8+dfsg-1" }, { "binary_name": "libwolfssl0", "binary_version": "3.4.8+dfsg-1" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-24585.json"
{ "binaries": [ { "binary_name": "libwolfssl-dev", "binary_version": "3.13.0+dfsg-1" }, { "binary_name": "libwolfssl15", "binary_version": "3.13.0+dfsg-1" } ] }
{ "binaries": [ { "binary_name": "libwolfssl-dev", "binary_version": "4.3.0+dfsg-2" }, { "binary_name": "libwolfssl24", "binary_version": "4.3.0+dfsg-2" } ] }