Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-5188

Опубликовано: 10 апр. 2026
Источник: debian
EPSS Низкий

Описание

An integer underflow issue exists in wolfSSL when parsing the Subject Alternative Name (SAN) extension of X.509 certificates. A malformed certificate can specify an entry length larger than the enclosing sequence, causing the internal length counter to wrap during parsing. This results in incorrect handling of certificate data. The issue is limited to configurations using the original ASN.1 parsing implementation which is off by default.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wolfsslunfixedpackage
wolfsslno-dsatrixiepackage
wolfsslno-dsabookwormpackage

Примечания

  • https://github.com/wolfSSL/wolfssl/pull/10024

  • Fixed by (merge): https://github.com/wolfSSL/wolfssl/commit/0f41e99c34c956ddea66e732b7db7828b7e2a403 (v5.9.1-stable)

EPSS

Процентиль: 8%
0.00028
Низкий

Связанные уязвимости

ubuntu
5 дней назад

An integer underflow issue exists in wolfSSL when parsing the Subject Alternative Name (SAN) extension of X.509 certificates. A malformed certificate can specify an entry length larger than the enclosing sequence, causing the internal length counter to wrap during parsing. This results in incorrect handling of certificate data. The issue is limited to configurations using the original ASN.1 parsing implementation which is off by default.

nvd
5 дней назад

An integer underflow issue exists in wolfSSL when parsing the Subject Alternative Name (SAN) extension of X.509 certificates. A malformed certificate can specify an entry length larger than the enclosing sequence, causing the internal length counter to wrap during parsing. This results in incorrect handling of certificate data. The issue is limited to configurations using the original ASN.1 parsing implementation which is off by default.

github
5 дней назад

An integer underflow issue exists in wolfSSL when parsing the Subject Alternative Name (SAN) extension of X.509 certificates. A malformed certificate can specify an entry length larger than the enclosing sequence, causing the internal length counter to wrap during parsing. This results in incorrect handling of certificate data. The issue is limited to configurations using the original ASN.1 parsing implementation which is off by default.

EPSS

Процентиль: 8%
0.00028
Низкий