In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSLCALLBACKS flag), then a malicious TLS 1.3 client or network attacker can trigger a buffer over-read on the heap of 5 bytes. (WOLFSSLCALLBACKS is only intended for debugging.)
{ "binaries": [ { "binary_version": "5.2.0-2", "binary_name": "libwolfssl-dev" }, { "binary_version": "5.2.0-2", "binary_name": "libwolfssl32" } ] }
{ "binaries": [ { "binary_version": "5.6.6-1.3build1", "binary_name": "libwolfssl-dev" }, { "binary_version": "5.6.6-1.3build1", "binary_name": "libwolfssl42t64" } ] }
{ "binaries": [ { "binary_version": "5.7.2-0.1", "binary_name": "libwolfssl-dev" }, { "binary_version": "5.7.2-0.1", "binary_name": "libwolfssl42t64" } ] }
{ "binaries": [ { "binary_version": "3.4.8+dfsg-1", "binary_name": "libcyassl5" }, { "binary_version": "3.4.8+dfsg-1", "binary_name": "libwolfssl-dev" }, { "binary_version": "3.4.8+dfsg-1", "binary_name": "libwolfssl0" } ] }
{ "binaries": [ { "binary_version": "3.13.0+dfsg-1", "binary_name": "libwolfssl-dev" }, { "binary_version": "3.13.0+dfsg-1", "binary_name": "libwolfssl15" } ] }
{ "binaries": [ { "binary_version": "4.3.0+dfsg-2", "binary_name": "libwolfssl-dev" }, { "binary_version": "4.3.0+dfsg-2", "binary_name": "libwolfssl24" } ] }