Bug#858476: RFS: wolfssl/3.10.2+dfsg-1 [RC] -- wolfSSL encryption library
Package: sponsorship-requests
Severity: important
Dear mentors,
I am looking for a sponsor for my package "wolfssl":
* Package name : wolfssl
Version : 3.10.2+dfsg-1
Upstream Author : wolfSSL Inc. <support@wolfssl.com>
* URL : www.wolfssl.com
* License : various
Section : libs
It builds those binary packages:
libwolfssl10 - wolfSSL encryption library
libwolfssl-dev - Development files for the wolfSSL encryption library
To access further information about this package, please visit the following
URL:
https://mentors.debian.net/package/wolfssl
Alternatively, one can download the package with dget using this command:
dget -x
https://mentors.debian.net/debian/pool/main/w/wolfssl/wolfssl_3.10.2+dfsg-1.dsc
More information about wolfSSL can be obtained from https://www.wolfssl.com.
Changes since the last upload:
* New upstream release.
* New major version is 10
* New maintainer email address
* Fixes a low level vulnerability for buffer overflow when loading a
malformed temporary DH file
* Fixes a medium level vulnerability for processing of OCSP response
* Fixes CVE-2017-6076, a low level vulnerability for a potential cache attack
on RSA operations (Closes: #856114)
Best regards,
Felix Lechner
-- System Information:
Debian Release: 9.0
APT prefers testing-debug
APT policy: (500, 'testing-debug'), (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 4.9.0-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
Reply to: