Description
A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare processing. In the error handling path of TLSX_KeyShare_ProcessPqcHybridClient() in src/tls.c, the inner function TLSX_KeyShare_ProcessPqcClient_ex() frees a KyberKey object upon encountering an error. The caller then invokes TLSX_KeyShare_FreeAll(), which attempts to call ForceZero() on the already-freed KyberKey, resulting in writes of zero bytes over freed heap memory.
INFO
Published Date :
2026-04-09T23:29:27.577Z
Last Modified :
2026-04-10T13:51:18.283Z
Source :
wolfSSL
AFFECTED PRODUCTS
The following products are affected by CVE-2026-5460 vulnerability.
| Vendors | Products |
|---|---|
| Wolfssl |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-5460.
| URL | Resource |
|---|---|
| https://github.com/wolfssl/wolfssl/pull/10092 |
|
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability