CVE-2026-5460

A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare processing. In the error handling path of TLSX_KeyShare_ProcessPqcHybridClient() in src/tls.c, the inner function TLSX_KeyShare_ProcessPqcClient_ex() frees a KyberKey object upon encountering an error. The caller then invokes TLSX_KeyShare_FreeAll(), which attempts to call ForceZero() on the already-freed KyberKey, resulting in writes of zero bytes over freed heap memory.
References
Link Resource
https://github.com/wolfssl/wolfssl/pull/10092 Issue Tracking Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

29 Apr 2026, 14:00

Type Values Removed Values Added
First Time Wolfssl
Wolfssl wolfssl
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
References () https://github.com/wolfssl/wolfssl/pull/10092 - () https://github.com/wolfssl/wolfssl/pull/10092 - Issue Tracking, Patch

10 Apr 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-10 00:16

Updated : 2026-04-29 14:00


NVD link : CVE-2026-5460

Mitre link : CVE-2026-5460

CVE.ORG link : CVE-2026-5460


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-416

Use After Free