Source: rust-openssl
Version: 0.10.78-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for rust-openssl.

CVE-2026-44662[0]:
| rust-openssl provides OpenSSL bindings for the Rust programming
| language. From 0.10.0 to before 0.10.79,
| CipherCtxRef::cipher_update, CipherCtxRef::cipher_update_vec, and
| symm::Crypter::update incorrectly sized output buffers when used
| with AES key-wrap-with-padding ciphers
| (EVP_aes_{128,192,256}_wrap_pad). For a non-multiple-of-8 input,
| OpenSSL writes up to 7 bytes past the end of the caller's buffer or
| Vec, producing attacker-controllable heap corruption when the
| plaintext length is attacker-influenced. This only impacts users
| using AES key-wrap-with-padding ciphers. This vulnerability is fixed
| in 0.10.79.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-44662
    https://www.cve.org/CVERecord?id=CVE-2026-44662
[1] 
https://github.com/rust-openssl/rust-openssl/security/advisories/GHSA-xv59-967r-8726

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to