Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-5264

Опубликовано: 09 апр. 2026
Источник: debian
EPSS Низкий

Описание

Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can send a crafted DTLS 1.3 ACK message that triggers a heap buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wolfsslunfixedpackage
wolfsslno-dsatrixiepackage
wolfsslno-dsabookwormpackage

Примечания

  • https://github.com/wolfssl/wolfssl/pull/10076

  • Fixed by (merge): https://github.com/wolfSSL/wolfssl/commit/5f54de05770e3258fb3a466074109c532334079b (v5.9.1-stable)

EPSS

Процентиль: 40%
0.00183
Низкий

Связанные уязвимости

ubuntu
5 дней назад

Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can send a crafted DTLS 1.3 ACK message that triggers a heap buffer overflow.

nvd
5 дней назад

Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can send a crafted DTLS 1.3 ACK message that triggers a heap buffer overflow.

github
5 дней назад

Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can send a crafted DTLS 1.3 ACK message that triggers a heap buffer overflow.

EPSS

Процентиль: 40%
0.00183
Низкий