In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSLCALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSLCALLBACKS is only intended for debugging).
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.6.6-1.2", "binary_name": "libwolfssl-dev" }, { "binary_version": "5.6.6-1.2", "binary_name": "libwolfssl42" }, { "binary_version": "5.6.6-1.2", "binary_name": "libwolfssl42-dbgsym" } ] }