Details about package wolfssl
Name: | wolfssl (PTS) |
---|---|
Uploader: | Jacob Barthelmeh <jacob@wolfssl.com> (Debian QA page) |
Description: | libwolfssl24 - wolfSSL encryption library libwolfssl-dev - Development files for the wolfSSL encryption library |
Package uploads
Upload #1
Information
Version: | 4.6.0+p1-1+deb11u1.1 |
---|---|
Uploaded: | 2022-12-06 08:49 |
Source package: | wolfssl_4.6.0+p1-1+deb11u1.1.dsc |
Distribution: | bullseye |
Section: | libs |
Priority: | optional |
Homepage: | https://www.wolfssl.com/products/wolfssl/ |
Vcs-Git: | https://salsa.debian.org/lechner/wolfssl.git -b debian/master |
Vcs-Browser: | https://salsa.debian.org/lechner/wolfssl |
Changelog
wolfssl (4.6.0+p1-1+deb11u1.1) bullseye; urgency=medium . * Stable update for the following vulnerabilities - PR 5498: CVE-2022-42961 - PR 5588: CVE-2022-39173 - PR 5682: CVE-2022-42905
QA information
-
–
Package uses debhelper-compatDebhelper compatibility level 13
-
–
A watch file is present but doesn't work
Warnings: In debian/watch no matching files for watch line
https://github.com/wolfSSL/wolfssl/releases .*/v(\d\S+)-stable\.tar\.gz -
–
Package is not native
Format: 3.0 (quilt) -
–
The uploader is not in the package's "Maintainer" or "Uploaders" fields
- User email
- jacob@wolfssl.com
- "Maintainer" email
- felix.lechner@lease-up.com
-
–
Package has lintian warningswolfssl source
-
W
no-nmu-in-changelog
- [debian/changelog:1]
-
I
out-of-date-standards-version
- 4.5.1 (released 2020-11-17) (current is 4.6.1.0)
-
I
patch-not-forwarded-upstream
- [debian/patches/fix-hurd-i386-flags.patch]
- [debian/patches/improve-clean-target.patch]
- [debian/patches/multi-arch.patch]
-
I
quilt-patch-missing-description
- [debian/patches/add-WOLFSSL_CHECK_SIG_FAULTS-macro.patch]
- [debian/patches/tls13-cipher-suites.patch]
- [debian/patches/wolfssl-callbacks-sanity-check.patch]
-
P
source-contains-autogenerated-visual-c++-file
- [resource.h]
-
P
trailing-whitespace
- [debian/changelog:21]
-
P
update-debian-copyright
- 2020 vs 2022 [debian/copyright:127]
-
P
very-long-line-length-in-source-file
- 1005 > 512 [mqx/wolfssl_client/.cproject:333]
- 1006 > 512 [mqx/wolfcrypt_test/.cproject:332]
- 1011 > 512 [mqx/wolfcrypt_benchmark/.cproject:340]
- 1191 > 512 [IDE/XilinxSDK/2018_2/.cproject:88]
- 1287 > 512 [wolfcrypt/src/fp_mul_comba_48.i:234]
- 1414 > 512 [scripts/sniffer-tls13-ecc.pcap:88]
- 1529 > 512 [IDE/Renesas/e2studio/GR-ROSE/smc/smc.scfg:770]
- 1529 > 512 [IDE/Renesas/e2studio/RX72NEnvisionKit/smc/smc.scfg:798]
- 1747 > 512 [wolfcrypt/src/fp_mul_comba_64.i:298]
- 5036 > 512 [wolfcrypt/src/port/caam/caam_doc.pdf:2297]
- 513 > 512 [IDE/Renesas/e2studio/RX72NEnvisionKit/wolfssl/.cproject:21]
- 520 > 512 [IDE/WORKBENCH/README.md:108]
- 521 > 512 [certs/test/cert-ext-nct.der:6]
- 523 > 512 [certs/test/server-badaltnull.der:2]
- 524 > 512 [certs/dh4096.der:1]
- 531 > 512 [IDE/CSBENCH/.cproject:103]
- 531 > 512 [wolfcrypt/src/fp_mul_comba_20.i:121]
- 532 > 512 [IDE/HEXIWEAR/wolfSSL_HW/.cproject:27]
- 534 > 512 [certs/ecc-rsa-server.p12:7]
- 539 > 512 [IDE/Renesas/e2studio/RA6M3/wolfssl/.cproject:179]
- 542 > 512 [certs/test/server-goodcn.der:2]
- 544 > 512 [certs/3072/client-key.der:1]
- 546 > 512 [certs/server-key.der:5]
- 546 > 512 [certs/server-keyPkcs8.der:5]
- 548 > 512 [IDE/LPCXPRESSO/README.md:16]
- 550 > 512 [IDE/Renesas/e2studio/GR-ROSE/smc/.cproject:20]
- 550 > 512 [IDE/Renesas/e2studio/Projects/test/.cproject:20]
- 551 > 512 [IDE/Renesas/e2studio/RX72NEnvisionKit/smc/.cproject:20]
- 556 > 512 [certs/intermediate/ca-int-cert.der:7]
- 556 > 512 [certs/intermediate/server-chain.der:25]
- 559 > 512 [README.md:81]
- 559 > 512 [README:81]
- 562 > 512 [certs/server-keyPkcs8Enc.der:2]
- 563 > 512 [certs/intermediate/client-chain.der:6]
- 563 > 512 [certs/intermediate/client-int-cert.der:6]
- 580 > 512 [wolfcrypt/src/fp_sqr_comba_48.i:285]
- 5835 > 512 [.DS_Store:4]
- 597 > 512 [certs/test/cert-ext-ia.der:6]
- 610 > 512 [doc/dox_comments/header_files/ssl.h:12516]
- 6148 > 512 [src/.DS_Store:1]
- 638 > 512 [certs/test-servercert-rc2.p12:4]
- 639 > 512 [wolfcrypt/src/fp_mul_comba_24.i:138]
- 664 > 512 [certs/3072/client-cert.der:3]
- 691 > 512 [IDE/HEXAGON/README.md:4]
- 721 > 512 [certs/test/cert-ext-nc.der:6]
- 738 > 512 [IDE/Renesas/e2studio/GR-ROSE/test/.cproject:21]
- 739 > 512 [IDE/Renesas/e2studio/RX72NEnvisionKit/test/.cproject:21]
- 747 > 512 [wolfcrypt/src/fp_mul_comba_28.i:154]
- 772 > 512 [wolfcrypt/src/fp_sqr_comba_64.i:365]
- 780 > 512 [IDE/Espressif/ESP-IDF/test/test_wolfssl.c:627]
- 798 > 512 [certs/dsa3072.der:4]
- 823 > 512 [sslSniffer/README.md:463]
- 845 > 512 [scripts/sniffer-tls13-dh.pcap:182]
- 851 > 512 [certs/test-servercert.p12:8]
- 855 > 512 [wolfcrypt/src/fp_mul_comba_32.i:172]
- 865 > 512 [certs/rsa3072.der:4]
- 869 > 512 [LPCExpresso.cproject:113]
- 894 > 512 [certs/4096/client-key.der:3]
- 903 > 512 [certs/rsa2048.der:4]
- 911 > 512 [ChangeLog.md:820]
- 915 > 512 [certs/test-ber-exp02-05-2022.p7b:1]
- 9279 > 512 [doc/formats/html/html_changes/tabs.css:1]
- 935 > 512 [configure.ac:5208]
- 936 > 512 [IDE/LPCXPRESSO/wolf_example/.cproject:138]
- 936 > 512 [mqx/wolfssl/.cproject:402]
- 937 > 512 [mqx/util_lib/.cproject:142]
- 948 > 512 [scripts/sniffer-tls13-hrr.pcap:38]
-
X
prefer-uscan-symlink
- filenamemangle s/.+\/v?(\d\S+)-stable\.tar\.gz/wolfssl-$1\.tar\.gz/ [debian/watch:6]
-
X
upstream-metadata-file-is-missing
-
W
no-nmu-in-changelog
-
–
Package is already in Debian
- The package uploader is currently maintaining wolfssl in Debian
- Last upload was on the 2022-11-19
-
–
d/copyright is in DEP5 format
Upstream Contact: David Garske <david@wolfssl.com> Licenses: GPL-3+-with-autoconf, Apache-2.0, BSD-3-clause, GPL-2+, FSFAP
Comments
-
You can make this 4.6.0+p1-1+deb11u2 with your name in the Maintainer field. You should send this as source package (or the debdiff from the base version) to the Security Team.
Bastian Germann at Dec. 6, 2022, 10:13 p.m.