DEBIAN-CVE-2026-3230

Source
https://security-tracker.debian.org/tracker/CVE-2026-3230
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3230.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-3230
Upstream
  • CVE-2026-3230
Published
2026-03-19T21:17:12.483Z
Modified
2026-03-27T10:03:08.712586Z
Severity
  • 2.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

Missing required cryptographic step in the TLS 1.3 client HelloRetryRequest handshake logic in wolfSSL could lead to a compromise in the confidentiality of TLS-protected communications via a crafted HelloRetryRequest followed by a ServerHello message that omits the required key_share extension, resulting in derivation of predictable traffic secrets from (EC)DHE shared secret. This issue does not affect the client's authentication of the server during TLS handshakes.

References

Affected packages

Debian:11 / wolfssl

Package

Name
wolfssl
Purl
pkg:deb/debian/wolfssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*
4.6.0-3
4.6.0+p1-0+deb11u1
4.6.0+p1-0+deb11u2
5.*
5.0.0-1~bpo11+1
5.0.0-1
5.1.1-1~bpo11+1
5.1.1-1
5.2.0-1
5.2.0-2~bpo11+1
5.2.0-2
5.5.3-1
5.5.3-2
5.5.3-3~bpo11+1
5.5.3-3
5.5.4-1
5.5.4-2~bpo11+1
5.5.4-2
5.5.4-2.1
5.6.4-1
5.6.4-2
5.6.6-1
5.6.6-1.1
5.6.6-1.2
5.6.6-1.3~exp1
5.6.6-1.3
5.7.0-0.1
5.7.0-0.2
5.7.0-0.3
5.7.2-0.1
5.7.2-0.2
5.7.2-0.3
5.7.2-0.4
5.8.2-1
5.8.2-1.1
5.8.2-1.2
5.8.4-1
5.9.0-0.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3230.json"

Debian:12 / wolfssl

Package

Name
wolfssl
Purl
pkg:deb/debian/wolfssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.5.4-2
5.5.4-2+deb12u1
5.5.4-2+deb12u2
5.5.4-2.1
5.6.4-1
5.6.4-2
5.6.6-1
5.6.6-1.1
5.6.6-1.2
5.6.6-1.3~exp1
5.6.6-1.3
5.7.0-0.1
5.7.0-0.2
5.7.0-0.3
5.7.2-0.1
5.7.2-0.2
5.7.2-0.3
5.7.2-0.4
5.8.2-1
5.8.2-1.1
5.8.2-1.2
5.8.4-1
5.9.0-0.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3230.json"

Debian:13 / wolfssl

Package

Name
wolfssl
Purl
pkg:deb/debian/wolfssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.7.2-0.1
5.7.2-0.1+deb13u1
5.7.2-0.2
5.7.2-0.3
5.7.2-0.4
5.8.2-1
5.8.2-1.1
5.8.2-1.2
5.8.4-1
5.9.0-0.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3230.json"

Debian:14 / wolfssl

Package

Name
wolfssl
Purl
pkg:deb/debian/wolfssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.9.0-0.1

Affected versions

5.*
5.7.2-0.1
5.7.2-0.2
5.7.2-0.3
5.7.2-0.4
5.8.2-1
5.8.2-1.1
5.8.2-1.2
5.8.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-3230.json"