Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-5447

Опубликовано: 09 апр. 2026
Источник: debian
EPSS Низкий

Описание

Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wolfsslunfixedpackage
wolfsslno-dsatrixiepackage
wolfsslno-dsabookwormpackage

Примечания

  • https://github.com/wolfSSL/wolfssl/pull/10112

  • Fixed by (merge): https://github.com/wolfSSL/wolfssl/commit/d278da09dfa60237f246236f2c8acc5d11c5915a (v5.9.1-stable)

EPSS

Процентиль: 9%
0.00033
Низкий

Связанные уязвимости

ubuntu
5 дней назад

Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension.

CVSS3: 5.3
redhat
5 дней назад

A flaw was found in wolfSSL. A heap buffer overflow, a type of memory corruption vulnerability, occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension. A remote attacker could exploit this flaw to cause a low integrity impact.

nvd
5 дней назад

Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension.

github
5 дней назад

Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension.

EPSS

Процентиль: 9%
0.00033
Низкий