Search for packages
| purl | pkg:deb/debian/wolfssl@5.1.1-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-3774-6bd4-8qcs | wolfSSL through 5.0.0 allows an attacker to cause a denial of service and infinite loop in the client component by sending crafted traffic from a Machine-in-the-Middle (MITM) position. The root cause is that the client module accepts TLS messages that normally are only sent to TLS servers. |
CVE-2021-44718
|
| VCID-ykdv-43ha-muhg | Use of Insufficiently Random Values wolfSSL uses non-random IV values in certain situations. This affects connections (without AEAD) using AES-CBC or DES3 with TLS or DTLS This occurs because of misplaced memory initialization in BuildMessage in internal.c. |
CVE-2022-23408
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-16T11:48:57.668567+00:00 | Debian Importer | Fixing | VCID-ykdv-43ha-muhg | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |
| 2026-04-16T10:22:34.902912+00:00 | Debian Importer | Fixing | VCID-3774-6bd4-8qcs | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |
| 2026-04-13T08:03:41.645181+00:00 | Debian Importer | Fixing | VCID-ykdv-43ha-muhg | https://security-tracker.debian.org/tracker/data/json | 38.3.0 |
| 2026-04-13T06:59:25.432980+00:00 | Debian Importer | Fixing | VCID-3774-6bd4-8qcs | https://security-tracker.debian.org/tracker/data/json | 38.3.0 |
| 2026-04-03T07:57:43.091434+00:00 | Debian Importer | Fixing | VCID-ykdv-43ha-muhg | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |
| 2026-04-03T07:57:43.038807+00:00 | Debian Importer | Fixing | VCID-3774-6bd4-8qcs | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |