NIXPKGS-2026-0009 published on 13 Jan 2026 CVE-2025-15346 updated 1 week, 1 day ago by @LeSuisse Activity log Created automatic suggestion 1 week, 6 days ago @LeSuisse removed 2 maintainers @fabaff @vifino 1 week, 1 day ago @LeSuisse accepted as draft 1 week, 1 day ago @LeSuisse published on GitHub 1 week, 1 day ago wolfSSL Python library `CERT_REQUIRED` mode fails to enforce client certificate requirement A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced. Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided. This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake. The issue affects versions up to and including 5.8.2. Affected products wolfssl =<5.8.2 Matching in nixpkgs pkgs.wolfssl Small, fast, portable implementation of TLS/SSL for embedded devices nixos-unstable 5.8.2 nixpkgs-unstable 5.8.2 nixos-unstable-small 5.8.2 nixos-25.11 5.8.2 nixos-25.11-small 5.8.2 nixpkgs-25.11-darwin 5.8.2 nixos-25.05 5.8.2 nixos-25.05-small 5.8.2 nixpkgs-25.05-darwin 5.8.2
CVE-2025-15346 updated 1 week, 1 day ago by @LeSuisse Activity log Created automatic suggestion 1 week, 6 days ago @LeSuisse removed 2 maintainers @fabaff @vifino 1 week, 1 day ago @LeSuisse accepted as draft 1 week, 1 day ago @LeSuisse published on GitHub 1 week, 1 day ago wolfSSL Python library `CERT_REQUIRED` mode fails to enforce client certificate requirement A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced. Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided. This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake. The issue affects versions up to and including 5.8.2. Affected products wolfssl =<5.8.2 Matching in nixpkgs pkgs.wolfssl Small, fast, portable implementation of TLS/SSL for embedded devices nixos-unstable 5.8.2 nixpkgs-unstable 5.8.2 nixos-unstable-small 5.8.2 nixos-25.11 5.8.2 nixos-25.11-small 5.8.2 nixpkgs-25.11-darwin 5.8.2 nixos-25.05 5.8.2 nixos-25.05-small 5.8.2 nixpkgs-25.05-darwin 5.8.2
pkgs.wolfssl Small, fast, portable implementation of TLS/SSL for embedded devices nixos-unstable 5.8.2 nixpkgs-unstable 5.8.2 nixos-unstable-small 5.8.2 nixos-25.11 5.8.2 nixos-25.11-small 5.8.2 nixpkgs-25.11-darwin 5.8.2 nixos-25.05 5.8.2 nixos-25.05-small 5.8.2 nixpkgs-25.05-darwin 5.8.2