| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xv59-967r-8726 | rust-openssl vulnerable to heap buffer overflow when encrypting with AES key-wrap-with-padding |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 17 May 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rust-openssl Project
Rust-openssl Project rust-openssl |
|
| Vendors & Products |
Rust-openssl Project
Rust-openssl Project rust-openssl |
Sat, 16 May 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.10.0 to before 0.10.79, CipherCtxRef::cipher_update, CipherCtxRef::cipher_update_vec, and symm::Crypter::update incorrectly sized output buffers when used with AES key-wrap-with-padding ciphers (EVP_aes_{128,192,256}_wrap_pad). For a non-multiple-of-8 input, OpenSSL writes up to 7 bytes past the end of the caller's buffer or Vec, producing attacker-controllable heap corruption when the plaintext length is attacker-influenced. This only impacts users using AES key-wrap-with-padding ciphers. This vulnerability is fixed in 0.10.79. | |
| Title | rust-openssl: Heap buffer overflow when encrypting with AES key-wrap-with-padding | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-16T01:01:45.712Z
Reserved: 2026-05-07T16:20:08.659Z
Link: CVE-2026-44662
Updated: 2026-05-16T01:01:35.303Z
Status : Deferred
Published: 2026-05-14T21:16:47.237
Modified: 2026-05-15T14:53:48.823
Link: CVE-2026-44662
No data.
OpenCVE Enrichment
Updated: 2026-05-17T19:30:08Z
Github GHSA