Search CVE reports
401 – 410 of 38012 results
Missing required cryptographic step in the TLS 1.3 client HelloRetryRequest handshake logic in wolfSSL could lead to a compromise in the confidentiality of TLS-protected communications via a crafted HelloRetryRequest followed by a...
1 affected package
wolfssl
| Package | 20.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
An integer overflow vulnerability existed in the static function wolfssl_add_to_chain, that caused heap corruption when certificate data was written out of bounds of an insufficiently sized certificate buffer. wolfssl_add_to_chain...
1 affected package
wolfssl
| Package | 20.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
qui is a web interface for managing qBittorrent instances. Versions 1.14.1 and below use a permissive CORS policy that reflects arbitrary origins while also returning Access-Control-Allow-Credentials: true, effectively allowing...
1 affected package
qbittorrent
| Package | 20.04 LTS |
|---|---|
| qbittorrent | Needs evaluation |
In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC...
1 affected package
wolfssl
| Package | 20.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
wolfSSL 5.8.4 on RISC-V RV32I architectures lacks a constant-time software implementation for 64-bit multiplication. The compiler-inserted __muldi3 subroutine executes in variable time based on operand values. This...
1 affected package
wolfssl
| Package | 20.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced...
1 affected package
wolfssl
| Package | 20.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a heap-based buffer overflow could occur when improperly storing the CRL number as a hexadecimal string, and a stack-based overflow...
1 affected package
wolfssl
| Package | 20.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION() function. When deserializing session data with SESSION_CERTS enabled, certificate and session id lengths are read from an untrusted input without...
1 affected package
wolfssl
| Package | 20.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
In wolfSSL 5.8.2 and earlier, a logic flaw existed in the TLS 1.2 server state machine implementation. The server could incorrectly accept the CertificateVerify message before the ClientKeyExchange message had been received. This...
1 affected package
wolfssl
| Package | 20.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
Integer underflow in wolfSSL packet sniffer <= 5.8.4 allows an attacker to cause a buffer overflow in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected...
1 affected package
wolfssl
| Package | 20.04 LTS |
|---|---|
| wolfssl | Needs evaluation |