GHSA-xv59-967r-8726Medium

rust-openssl vulnerable to heap buffer overflow when encrypting with AES key-wrap-with-padding

Published
May 7, 2026
Last Modified
May 15, 2026

🔗 CVE IDs covered (1)

📋 Description

`CipherCtxRef::cipher_update`, `CipherCtxRef::cipher_update_vec`, and `symm::Crypter::update` incorrectly sized output buffers when used with AES key-wrap-with-padding ciphers (`EVP_aes_{128,192,256}_wrap_pad`). For a non-multiple-of-8 input, OpenSSL writes up to 7 bytes past the end of the caller's buffer or Vec, producing attacker-controllable heap corruption when the plaintext length is attacker-influenced. This only impacts users using AES key-wrap-with-padding ciphers.

🎯 Affected products1

  • rust/openssl:>= 0.10.0, < 0.10.79

🔗 References (3)