Source: wolfssl
Version: 5.8.2-1.2
Severity: important
Tags: security upstream
Forwarded: https://github.com/wolfSSL/wolfssl/pull/9395
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for wolfssl.

CVE-2025-12889[0]:
| With TLS 1.2 connections a client can use any digest, specifically a
| weaker digest that is supported, rather than those in the
| CertificateRequest.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-12889
    https://www.cve.org/CVERecord?id=CVE-2025-12889
[1] https://github.com/wolfSSL/wolfssl/pull/9395

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to