[Bug 1229877] New: VUL-0: CVE-2024-5814: rpcs3: wolfssl: TLS1.2 servers can force TLS1.3 clients with downgrade capability to use a ciphersuite that they did not agree to
https://bugzilla.suse.com/show_bug.cgi?id=1229877 Bug ID: 1229877 Summary: VUL-0: CVE-2024-5814: rpcs3: wolfssl: TLS1.2 servers can force TLS1.3 clients with downgrade capability to use a ciphersuite that they did not agree to Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.6 Hardware: Other URL: https://smash.suse.de/issue/419068/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: i@guoyunhe.me Reporter: smash_bz@suse.de QA Contact: security-team@suse.de CC: camila.matos@suse.com Target Milestone: --- Found By: Security Response Team Blocker: --- A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping fully parsing the server hello. https://doi.org/10.46586/tches.v2024.i1.457-500 References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-5814 https://www.cve.org/CVERecord?id=CVE-2024-5814 https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#add_later -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229877 https://bugzilla.suse.com/show_bug.cgi?id=1229877#c1 --- Comment #1 from Camila Camargo de Matos <camila.matos@suse.com> --- Package openSUSE:Factory/rpcs3 contains an embedded copy of wolfssl. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229877 SMASH SMASH <smash_bz@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Priority|P5 - None |P3 - Medium -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com