Search for packages
| purl | pkg:deb/debian/wolfssl@0?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-17td-zhva-7fc1 | A certificate verification error in wolfSSL when building with the WOLFSSL_SYS_CA_CERTS and WOLFSSL_APPLE_NATIVE_CERT_VALIDATION options results in the wolfSSL client failing to properly verify the server certificate's domain name, allowing any certificate issued by a trusted CA to be accepted regardless of the hostname. |
CVE-2025-7395
|
| VCID-1uk4-yg8u-kyck | security update |
CVE-2014-6491
|
| VCID-56vb-qqan-6fcd | security update |
CVE-2014-6496
|
| VCID-73c6-zn7h-6ude | In wolfSSL release 5.8.2 blinding support is turned on by default for Curve25519 in applicable builds. The blinding configure option is only for the base C implementation of Curve25519. It is not needed, or available with; ARM assembly builds, Intel assembly builds, and the small Curve25519 feature. While the side-channel attack on extracting a private key would be very difficult to execute in practice, enabling blinding provides an additional layer of protection for devices that may be more susceptible to physical access or side-channel observation. |
CVE-2025-7396
|
| VCID-dusy-ap5e-kyea | security update |
CVE-2014-6494
|
| VCID-f72k-wxht-zka6 | security update |
CVE-2014-6478
|
| VCID-k32r-azxg-9yh3 | An issue was discovered in wolfSSL before 5.5.0 (when --enable-session-ticket is used); however, only version 5.3.0 is exploitable. Man-in-the-middle attackers or a malicious server can crash TLS 1.2 clients during a handshake. If an attacker injects a large ticket (more than 256 bytes) into a NewSessionTicket message in a TLS 1.2 handshake, and the client has a non-empty session cache, the session cache frees a pointer that points to unallocated memory, causing the client to crash with a "free(): invalid pointer" message. NOTE: It is likely that this is also exploitable during TLS 1.3 handshakes between a client and a malicious server. With TLS 1.3, it is not possible to exploit this as a man-in-the-middle. |
CVE-2022-38153
|
| VCID-pq7n-tyq2-xucr | security update |
CVE-2014-6495
|
| VCID-rtzg-kdyv-kyfk | security update |
CVE-2014-6500
|
| VCID-ykdv-43ha-muhg | Use of Insufficiently Random Values wolfSSL uses non-random IV values in certain situations. This affects connections (without AEAD) using AES-CBC or DES3 with TLS or DTLS This occurs because of misplaced memory initialization in BuildMessage in internal.c. |
CVE-2022-23408
|