There is a remotely exploitable security issue in wolfSSL library prior to version 5.5.1. In default configuration this applies to OpenWrt releases 21.02 and 22.03, which have LuCI web user interface exposed to local area network clients over HTTPS by uhttpd web server.
Full advisory can be found on a dedicated wiki page.
Package upgrade using command line
You need to update the affected packages you're using with the command below.
Thank you for the report, should be ok now, please try again.
I was first thinking about using opkg list-upgradable | cut -d ' ' -f 1 | xargs opkg upgrade, but this could probably cause some side effects in some environments so I simply went with the hotfix for the vulnerable uhttpd service, did not wanted to confuse users with more steps then necessary.
Running opkg upgrade px5g-wolfssl wpad-basic-wolfssl; opkg remove libwolfssl5.4.0.ee39414e should be likely enough.
I've read the Security Advisory and I know 19.07 is not supported anymore but I believe my question was quite specific - as there are no wolfssl libraries or dependencies in default 19.07.10 images there is no vulnerability, right ? I know you could optionally install wolfssl and dependent packages but that was not the point.
I attempted to remove libwolfssl5.4.0.ee39414e and received the following:
# opkg remove libwolfssl5.4.0.ee39414e
No packages removed.
Collected errors:
* print_dependents_warning: Package libwolfssl5.4.0.ee39414e is depended upon by packages:
* print_dependents_warning: wpad-basic-wolfssl
* print_dependents_warning: px5g-wolfssl
* print_dependents_warning: These might cease to work if package libwolfssl5.4.0.ee39414e is removed.
* print_dependents_warning: Force removal of this package with --force-depends.
* print_dependents_warning: Force removal of this package and its dependents
* print_dependents_warning: with --force-removal-of-dependent-packages.
Should we force the removal of libwolfssl5.4.0.ee39414e ?
EDIT
Following up after re-reading @Bill post more closely. I performed the following:
Simply updating px5g-wolfssl (which is necessary!) will automatically remove libwolfssl5.4.0 cleanly, as the older version of px5g is what causes the (unnecessary) dependency.
I'm not sure if this is the correct thread for this but curl stopped working for https after updating the wolfssl packages.. I'm not sure how to fix the issue with curl
It could be that curl was compiled against the older library. Check to see if there is an update to the curl package. (I'm guessing here, no direct knowledge.)
According to the wiki page, the requirement condition is "a malicious attacker in the same local network as the OpenWrt device". If all the clients in the same "local network" as the OpenWrt device are trustworthy, should I worry about the vulnerability? In my case, I am the only client of the OpenWrt router (22.3.0) and I don't expose LuCI to external networks.