Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:conan/wolfssl@5.0.0
purl pkg:conan/wolfssl@5.0.0
Tags Ghost
Next non-vulnerable version 5.6.3
Latest non-vulnerable version 5.6.3
Risk
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-3774-6bd4-8qcs
Aliases:
CVE-2021-44718
wolfSSL through 5.0.0 allows an attacker to cause a denial of service and infinite loop in the client component by sending crafted traffic from a Machine-in-the-Middle (MITM) position. The root cause is that the client module accepts TLS messages that normally are only sent to TLS servers.
5.1.1
Affected by 8 other vulnerabilities.
VCID-ykdv-43ha-muhg
Aliases:
CVE-2022-23408
Use of Insufficiently Random Values wolfSSL uses non-random IV values in certain situations. This affects connections (without AEAD) using AES-CBC or DES3 with TLS or DTLS This occurs because of misplaced memory initialization in BuildMessage in internal.c.
5.1.1
Affected by 8 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-03T21:27:35.030354+00:00 GitLab Importer Affected by VCID-3774-6bd4-8qcs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/conan/wolfssl/CVE-2021-44718.yml 38.1.0
2026-04-01T12:49:18.270709+00:00 GitLab Importer Affected by VCID-ykdv-43ha-muhg https://gitlab.com/gitlab-org/advisories-community/-/blob/main/conan/wolfssl/CVE-2022-23408.yml 38.0.0