Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/wolfssl@4.6.0%2Bp1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wolfssl@4.6.0%2Bp1-0%2Bdeb11u1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-3774-6bd4-8qcs wolfSSL through 5.0.0 allows an attacker to cause a denial of service and infinite loop in the client component by sending crafted traffic from a Machine-in-the-Middle (MITM) position. The root cause is that the client module accepts TLS messages that normally are only sent to TLS servers. CVE-2021-44718
VCID-av4q-73pk-tucd Improper Authentication In wolfSSL before 5.2.0, a TLS 1.3 server cannot properly enforce a requirement for mutual authentication. A client can simply omit the `certificate_verify` message from the handshake, and never present a certificate. CVE-2022-25640
VCID-h2vp-p7fd-7bev Improper Handling of Exceptional Conditions wolfSSL does not produce a failure outcome when the serial number in an OCSP request differs from the serial number in the OCSP response. CVE-2021-37155
VCID-mtcu-yhz9-c7b8 Improper Certificate Validation In wolfSSL before 5.2.0, certificate validation may be bypassed during attempted authentication by a TLS 1.3 client to a TLS 1.3 server. This occurs when the `sig_algo` field differs between the `certificate_verify` message and the certificate message. CVE-2022-25638
VCID-yyy6-k4y2-s3ep Insufficient Verification of Data Authenticity wolfSSL incorrectly skips OCSP verification in certain situations of irrelevant response data that contains the NoCheck extension. CVE-2021-38597

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:45:50.744173+00:00 Debian Importer Fixing VCID-yyy6-k4y2-s3ep https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:31.363026+00:00 Debian Importer Fixing VCID-av4q-73pk-tucd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:34.891971+00:00 Debian Importer Fixing VCID-3774-6bd4-8qcs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:49:54.849763+00:00 Debian Importer Fixing VCID-h2vp-p7fd-7bev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:13.996253+00:00 Debian Importer Fixing VCID-mtcu-yhz9-c7b8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:45:14.484691+00:00 Debian Importer Fixing VCID-yyy6-k4y2-s3ep https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:03.084432+00:00 Debian Importer Fixing VCID-av4q-73pk-tucd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:25.421299+00:00 Debian Importer Fixing VCID-3774-6bd4-8qcs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:02.634089+00:00 Debian Importer Fixing VCID-h2vp-p7fd-7bev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:19.901534+00:00 Debian Importer Fixing VCID-mtcu-yhz9-c7b8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:57:43.206349+00:00 Debian Importer Fixing VCID-av4q-73pk-tucd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:43.158886+00:00 Debian Importer Fixing VCID-mtcu-yhz9-c7b8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:43.052394+00:00 Debian Importer Fixing VCID-3774-6bd4-8qcs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:43.000570+00:00 Debian Importer Fixing VCID-yyy6-k4y2-s3ep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:42.942670+00:00 Debian Importer Fixing VCID-h2vp-p7fd-7bev https://security-tracker.debian.org/tracker/data/json 38.1.0