diff mbox series

[meta-networking,whinlatter,24/24] wolfssl: patch CVE-2026-5778

Message ID 20260430114649.4184890-24-ankur.tyagi85@gmail.com
State Under Review
Delegated to: Anuj Mittal
Headers show
Series [meta-oe,whinlatter,1/24] libgpiod: update to v2.2.3 | expand

Commit Message

Ankur Tyagi April 30, 2026, 11:46 a.m. UTC
From: Ankur Tyagi <ankur.tyagi85@gmail.com>

Backport commit from the PR[1] mentioned in the nvd[2]

[1]https://github.com/wolfSSL/wolfssl/pull/10125
[2]https://nvd.nist.gov/vuln/detail/CVE-2026-5778

Signed-off-by: Ankur Tyagi <ankur.tyagi85@gmail.com>
---
 .../wolfssl/files/CVE-2026-5778.patch         | 38 +++++++++++++++++++
 .../wolfssl/wolfssl_5.8.0.bb                  |  1 +
 2 files changed, 39 insertions(+)
 create mode 100644 meta-networking/recipes-connectivity/wolfssl/files/CVE-2026-5778.patch
diff mbox series

Patch

diff --git a/meta-networking/recipes-connectivity/wolfssl/files/CVE-2026-5778.patch b/meta-networking/recipes-connectivity/wolfssl/files/CVE-2026-5778.patch
new file mode 100644
index 0000000000..b640b41bd0
--- /dev/null
+++ b/meta-networking/recipes-connectivity/wolfssl/files/CVE-2026-5778.patch
@@ -0,0 +1,38 @@ 
+From 0eee2c2d172a28dc9159211d0d22323c980a48f4 Mon Sep 17 00:00:00 2001
+From: Kareem <kareem@wolfssl.com>
+Date: Thu, 2 Apr 2026 16:41:55 -0700
+Subject: [PATCH] Add sz check to ChachaAEADDecrypt to prevent potential
+ underflow.
+
+Thanks to Zou Dikai for the report.
+
+(cherry picked from commit 5b6b138964058ab8d30474bc9fdfb5ffcb3a4726)
+
+CVE: CVE-2026-5778
+Upstream-Status: Backport [https://github.com/wolfSSL/wolfssl/commit/5b6b138964058ab8d30474bc9fdfb5ffcb3a4726]
+Signed-off-by: Ankur Tyagi <ankur.tyagi85@gmail.com>
+---
+ src/internal.c | 7 ++++++-
+ 1 file changed, 6 insertions(+), 1 deletion(-)
+
+diff --git a/src/internal.c b/src/internal.c
+index 6af03cbf0..40d1dd7cc 100644
+--- a/src/internal.c
++++ b/src/internal.c
+@@ -19310,10 +19310,15 @@ int ChachaAEADDecrypt(WOLFSSL* ssl, byte* plain, const byte* input,
+     byte tag[POLY1305_AUTH_SZ];
+     byte poly[CHACHA20_256_KEY_SIZE]; /* generated key for mac */
+     int ret    = 0;
+-    int msgLen = (sz - ssl->specs.aead_mac_size);
++    int msgLen = 0;
+     Keys* keys = &ssl->keys;
+     byte* seq = NULL;
+ 
++    if (sz < ssl->specs.aead_mac_size) {
++        return BAD_FUNC_ARG;
++    }
++    msgLen = (sz - ssl->specs.aead_mac_size);
++
+     #ifdef CHACHA_AEAD_TEST
+        int i;
+        printf("input before decrypt :\n");
diff --git a/meta-networking/recipes-connectivity/wolfssl/wolfssl_5.8.0.bb b/meta-networking/recipes-connectivity/wolfssl/wolfssl_5.8.0.bb
index 3b3db9ad6f..0f1fe43d79 100644
--- a/meta-networking/recipes-connectivity/wolfssl/wolfssl_5.8.0.bb
+++ b/meta-networking/recipes-connectivity/wolfssl/wolfssl_5.8.0.bb
@@ -36,6 +36,7 @@  SRC_URI = " \
     file://CVE-2026-5447.patch \
     file://CVE-2026-5772-1.patch \
     file://CVE-2026-5772-2.patch \
+    file://CVE-2026-5778.patch \
 "
 
 SRCREV = "b077c81eb635392e694ccedbab8b644297ec0285"