CVE-2026-3547

Out-of-bounds read in ALPN parsing due to incomplete validation. wolfSSL 5.8.4 and earlier contained an out-of-bounds read in ALPN handling when built with ALPN enabled (HAVE_ALPN / --enable-alpn). A crafted ALPN protocol list could trigger an out-of-bounds read, leading to a potential process crash (denial of service). Note that ALPN is disabled by default, but is enabled for these 3rd party compatibility features: enable-apachehttpd, enable-bind, enable-curl, enable-haproxy, enable-hitch, enable-lighty, enable-jni, enable-nginx, enable-quic.
References
Link Resource
https://github.com/wolfSSL/wolfssl/pull/9859 Issue Tracking Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-19 21:17

Updated : 2026-03-26 18:27


NVD link : CVE-2026-3547

Mitre link : CVE-2026-3547

CVE.ORG link : CVE-2026-3547


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-125

Out-of-bounds Read