Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xv59-967r-8726 | rust-openssl vulnerable to heap buffer overflow when encrypting with AES key-wrap-with-padding |
Sat, 16 May 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.10.0 to before 0.10.79, CipherCtxRef::cipher_update, CipherCtxRef::cipher_update_vec, and symm::Crypter::update incorrectly sized output buffers when used with AES key-wrap-with-padding ciphers (EVP_aes_{128,192,256}_wrap_pad). For a non-multiple-of-8 input, OpenSSL writes up to 7 bytes past the end of the caller's buffer or Vec, producing attacker-controllable heap corruption when the plaintext length is attacker-influenced. This only impacts users using AES key-wrap-with-padding ciphers. This vulnerability is fixed in 0.10.79. | |
| Title | rust-openssl: Heap buffer overflow when encrypting with AES key-wrap-with-padding | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-16T01:01:45.712Z
Reserved: 2026-05-07T16:20:08.659Z
Link: CVE-2026-44662
Updated: 2026-05-16T01:01:35.303Z
Status : Deferred
Published: 2026-05-14T21:16:47.237
Modified: 2026-05-15T14:53:48.823
Link: CVE-2026-44662
No data.
OpenCVE Enrichment
Updated: 2026-05-14T22:00:10Z
Github GHSA