Source: wolfssl
Version: 5.8.2-1.2
Severity: important
Tags: security upstream
Forwarded: https://github.com/wolfSSL/wolfssl/pull/9117
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for wolfssl.

CVE-2025-11935[0]:
| With TLS 1.3 pre-shared key (PSK) a malicious or faulty server could
| ignore the request for PFS (perfect forward secrecy) and the client
| would continue on with the connection using PSK without PFS. This
| happened when a server responded to a ClientHello containing
| psk_dhe_ke without a key_share extension. The re-use of an
| authenticated PSK connection that on the clients side unexpectedly
| did not have PFS, reduces the security of the connection.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-11935
    https://www.cve.org/CVERecord?id=CVE-2025-11935
[1] https://github.com/wolfSSL/wolfssl/pull/9117
[2] 
https://github.com/wolfSSL/wolfssl/commit/b1cdf0b214f0e9c0d34e29d16325cbe9a8deb87d

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to