Hi Felix,

On Tue, Oct 06, 2015 at 03:29:46PM +0200, Sebastian Ramacher wrote:
> Source: wolfssl
> Version: 3.4.8+dfsg-1
> Severity: important
> Tags: security fixed-upstream
> 
> Hi,
> 
> wolfssl 3.6.8 was released fixing CVE-2015-6925. The DTLS server
> implementation in earlier versions allowed to run DoS attacks on a
> wolfssl based DTLS server or use it to amplify an DoS attack since the
> DTLS cookie was not generated properly.
> 
> See the upstream announcement [1, 2] and the PoC [3] for more details.
> 
> When fixing this issue, please include CVE identifier in the changelog.
> 
> [1]
> https://www.wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found,_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html
> [2]
> http://wolfssl.com/wolfSSL/Blog/Entries/2015/9/18_wolfSSL_3.6.8_is_Now_Available.html
> [3] https://github.com/IAIK/wolfSSL-DoS

Any news on this. Could you upload 3.6.8 to unstable?

Regards,
Salvatore

Reply via email to