Source: rust-openssl
Version: 0.10.78-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi,
The following vulnerability was published for rust-openssl.
CVE-2026-44662[0]:
| rust-openssl provides OpenSSL bindings for the Rust programming
| language. From 0.10.0 to before 0.10.79,
| CipherCtxRef::cipher_update, CipherCtxRef::cipher_update_vec, and
| symm::Crypter::update incorrectly sized output buffers when used
| with AES key-wrap-with-padding ciphers
| (EVP_aes_{128,192,256}_wrap_pad). For a non-multiple-of-8 input,
| OpenSSL writes up to 7 bytes past the end of the caller's buffer or
| Vec, producing attacker-controllable heap corruption when the
| plaintext length is attacker-influenced. This only impacts users
| using AES key-wrap-with-padding ciphers. This vulnerability is fixed
| in 0.10.79.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2026-44662
https://www.cve.org/CVERecord?id=CVE-2026-44662
[1]
https://github.com/rust-openssl/rust-openssl/security/advisories/GHSA-xv59-967r-8726
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore