Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-5507

Опубликовано: 09 апр. 2026
Источник: debian
EPSS Низкий

Описание

When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject a crafted session into the cache and for the application to call specific session restore APIs.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wolfsslunfixedpackage
wolfsslno-dsatrixiepackage
wolfsslno-dsabookwormpackage

Примечания

  • https://github.com/wolfSSL/wolfssl/pull/10088

  • Fixed by (merge): https://github.com/wolfSSL/wolfssl/commit/750f3b119e04a8c83bd601014fbd47cdc8856d3c (v5.9.1-stable)

EPSS

Процентиль: 4%
0.00016
Низкий

Связанные уязвимости

ubuntu
5 дней назад

When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject a crafted session into the cache and for the application to call specific session restore APIs.

nvd
5 дней назад

When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject a crafted session into the cache and for the application to call specific session restore APIs.

github
5 дней назад

When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject a crafted session into the cache and for the application to call specific session restore APIs.

EPSS

Процентиль: 4%
0.00016
Низкий