"value":"Remotely executed SEGV and out of bounds read allows malicious packet sender to crash or cause an out of bounds read via sending a malformed packet with the correct length.\n"
}
]
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang":"eng",
"value":"CWE-129 Improper Validation of Array Index",
"value":"<span style=\"background-color: rgb(255, 255, 255);\">Affects TLS 1.3 on the server side when accepting a connection from a malicious TLS 1.3 client. <span style=\"background-color: rgb(255, 255, 255);\">If using TLS 1.3 on the server side it is recommended to update the version of wolfSSL used.</span></span><br>"
}
],
"value":"Affects TLS 1.3 on the server side when accepting a connection from a malicious TLS 1.3 client.\u00a0If using TLS 1.3 on the server side it is recommended to update the version of wolfSSL used.\n"
}
],
"solution":[
{
"lang":"en",
"supportingMedia":[
{
"base64":false,
"type":"text/html",
"value":"Update wolfSSL to 5.7.0 or apply the fix located in: <a target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/wolfSSL/wolfssl/pull/7099\">https://github.com/wolfSSL/wolfssl/pull/7099</a>.<br>"
}
],
"value":"Update wolfSSL to 5.7.0 or apply the fix located in:\u00a0 https://github.com/wolfSSL/wolfssl/pull/7099 .\n"