On 10/5/22 11:46, Petr Štetiar wrote:
Hi,

we need to upgrade wolfSSL to version 5.5.1 as it fixes several remotely
exploitable vulnerabilities in TLS v1.3 protocol handling, so I suggest to do
so by backporting following commits from 22.03 release.

I've tested this change in x86/64 QEMU, using 
openwrt-21.02.3-x86-64-generic-squashfs-combined.img.gz image as a base:

   root@OpenWrt:/# opkg list-upgradable | cut -d ' ' -f 1 | xargs opkg upgrade
   Upgrading libustream-wolfssl20201210 on root from 2022-01-16-868fd881-1 to 
2022-01-16-868fd881-2...
   Downloading 
http://192.168.220.1/~ynezz/packages/21.02/x86_64/base//libustream-wolfssl20201210_2022-01-16-868fd881-2_x86_64.ipk
   Installing libwolfssl5.5.1.99a5b54a (5.5.1-stable-2) to root...
   Downloading 
http://192.168.220.1/~ynezz/packages/21.02/x86_64/base//libwolfssl5.5.1.99a5b54a_5.5.1-stable-2_x86_64.ipk
   Upgrading px5g-wolfssl on root from 3 to 4.1...
   Downloading 
http://192.168.220.1/~ynezz/packages/21.02/x86_64/base//px5g-wolfssl_4.1_x86_64.ipk
   Configuring libwolfssl5.5.1.99a5b54a.
   Configuring libustream-wolfssl20201210.
   Configuring px5g-wolfssl.

Then verified, that:

   * px5g still works
   * LuCI is still accessible over HTTPS
   * opkg/uclient can still fetch from HTTPS

Cheers,

Petr

1. 
https://downloads.openwrt.org/releases/21.02.3/targets/x86/64/openwrt-21.02.3-x86-64-generic-squashfs-combined.img.gz

Eneas U de Queiroz (2):
   wolfssl: bump to v5.3.0-stable
   wolfssl: bump to 5.4.0

Ivan Pavlov (1):
   wolfssl: bump to 5.5.0

Petr Štetiar (2):
   wolfssl: fix TLSv1.3 RCE in uhttpd by using 5.5.1-stable
     (CVE-2022-39173)
   treewide: fix security issues by bumping all packages using libwolfssl

Acked-by: Hauke Mehrtens <[email protected]>


_______________________________________________
openwrt-devel mailing list
[email protected]
https://lists.openwrt.org/mailman/listinfo/openwrt-devel

Reply via email to