Skip to content

Conversation

earlephilhower
Copy link
Collaborator

@earlephilhower earlephilhower commented Oct 22, 2018

Apply patches developed by Sze Yiu which correct a vulnerability in
X509 parsing. See CVE-2018-16150 and CVE-2018-16149 for more info.

This was built from https://github.com/earlephilhower/axtls-8266
"cvefix" branch and not https://github.com/igrr/axtls-8266 "master"
branch to get it out there faster.

Build from the original @igrr repo after merge:
https://github.com/igrr/axtls-8266

Testing w/server and client shows no problems and Sze's tests show it to have closed
some of the CVEs he discovered. The actual CVE details and exploit code
will need to wait the appropriate time before release.

Apply patches developed by Sze Yiu which correct a vulnerability in
X509 parsing.  See CVE-2018-16150 and CVE-2018-16149 for more info.

This was built from https://github.com/earlephilhower/axtls-8266
"cvefix" branch and not https://github.com/igrr/axtls-8266 "master"
branch to get it out there faster.
CA certification validation was broken by a change put in during a warning
cleanup a long time ago.  This binary now includes the 1-line correction
and HTTPSRequestCACert now works again (before was failing because the key
usages in certs were not properly read).
@earlephilhower earlephilhower merged commit 42c977b into esp8266:master Oct 24, 2018
@earlephilhower earlephilhower deleted the cvefix branch October 24, 2018 19:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant