Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/wolfssl@4.5.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/wolfssl@4.5.0%2Bdfsg-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-3tpe-fc34-f7c2 An issue was discovered in the DTLS handshake implementation in wolfSSL before 4.5.0. Clear DTLS application_data messages in epoch 0 do not produce an out-of-order error. Instead, these messages are returned to the application. CVE-2020-24585
VCID-4sc5-xnae-93ff wolfSSL before 4.5.0 mishandles TLS 1.3 server data in the WAIT_CERT_CR state, within SanityCheckTls13MsgReceived() in tls13.c. This is an incorrect implementation of the TLS 1.3 client state machine. This allows attackers in a privileged network position to completely impersonate any TLS 1.3 servers, and read or modify potentially sensitive information between clients using the wolfSSL library and these TLS servers. CVE-2020-24613
VCID-k1q1-y9ne-wuh7 An issue was discovered in wolfSSL before 4.5.0, when single precision is not employed. Local attackers can conduct a cache-timing attack against public key operations. These attackers may already have obtained sensitive information if the affected system has been used for private key operations (e.g., signing with a private key). CVE-2020-15309
VCID-y7jq-khf1-97gj An issue was discovered in wolfSSL before 4.5.0. It mishandles the change_cipher_spec (CCS) message processing logic for TLS 1.3. If an attacker sends ChangeCipherSpec messages in a crafted way involving more than one in a row, the server becomes stuck in the ProcessReply() loop, i.e., a denial of service. CVE-2020-12457

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:01:42.134913+00:00 Debian Importer Fixing VCID-k1q1-y9ne-wuh7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:28:18.240298+00:00 Debian Importer Fixing VCID-4sc5-xnae-93ff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:20:16.536828+00:00 Debian Importer Fixing VCID-3tpe-fc34-f7c2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:51.696173+00:00 Debian Importer Fixing VCID-y7jq-khf1-97gj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:57:16.462907+00:00 Debian Importer Fixing VCID-k1q1-y9ne-wuh7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:17.205294+00:00 Debian Importer Fixing VCID-4sc5-xnae-93ff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:26:25.477197+00:00 Debian Importer Fixing VCID-3tpe-fc34-f7c2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:23.422814+00:00 Debian Importer Fixing VCID-y7jq-khf1-97gj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:57:42.734804+00:00 Debian Importer Fixing VCID-4sc5-xnae-93ff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:42.687224+00:00 Debian Importer Fixing VCID-3tpe-fc34-f7c2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:42.639039+00:00 Debian Importer Fixing VCID-k1q1-y9ne-wuh7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:42.590557+00:00 Debian Importer Fixing VCID-y7jq-khf1-97gj https://security-tracker.debian.org/tracker/data/json 38.1.0