CVE-2026-3229 PUBLISHED

Integer Overflow in Certificate Chain Allocation

Assigner: wolfSSL
Reserved: 25.02.2026 Published: 19.03.2026 Updated: 19.03.2026

An integer overflow vulnerability existed in the static function wolfssl_add_to_chain, that caused heap corruption when certificate data was written out of bounds of an insufficiently sized certificate buffer. wolfssl_add_to_chain is called by these API: wolfSSL_CTX_add_extra_chain_cert, wolfSSL_CTX_add1_chain_cert, wolfSSL_add0_chain_cert. These API are enabled for 3rd party compatibility features: enable-opensslall, enable-opensslextra, enable-lighty, enable-stunnel, enable-nginx, enable-haproxy. This issue is not remotely exploitable, and would require that the application context loading certificates is compromised.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Green
CVSS Score: 1.2

Product Status

Vendor wofSSL
Product wolfSSL
Versions Default: unaffected
  • affected from 0 to 5.9.0 (excl.)

Credits

  • Kunyuk finder
  • Pelioro finder

References

Problem Types

  • CWE-122 Heap-based buffer overflow CWE