GHSA-G433-PQ76-6CMF
Vulnerability from github – Published: 2026-02-13 20:05 – Updated: 2026-02-13 20:05
VLAI?
Summary
Bug fixes in hpke-rs, hpke-rs-rust-crypto
Details
We publish a GitHub security advisory for any releases whose CHANGELOG includes bug-fixes, and encourage our users to upgrade. The latest releases of the hpke-rs and hpke-rs-rust-crypto crates contain the following bug-fixes:
hpke-rs
- #127: Fix
KemAlgorithm::TryFrom<u16>mapping where0x004Dincorrectly resolved toXWingDraft06instead ofXWingDraft06Obsolete. - #123: Fix potential overflow in context counter and switch to use u64.
- #128: Return errors when trying to use open/seal with export only ciphersuite and when using kdf export with an output that's too long (instead of truncating it)
The issue fixed in #123 was first reported by Nadim Kobeissi. The issues fixed in #127 and #128 were first reported by Scott Arciszewski.
hpke-rs-rust-crypto
- #124: Error out on x25519 0 keys
The issue fixed in #124 was first reported by Nadim Kobeissi.
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "hpke-rs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.6.0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "crates.io",
"name": "hpke-rs-rust-crypto"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.6.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-190",
"CWE-20",
"CWE-697"
],
"github_reviewed": true,
"github_reviewed_at": "2026-02-13T20:05:10Z",
"nvd_published_at": null,
"severity": "MODERATE"
},
"details": "We publish a GitHub security advisory for any releases whose CHANGELOG includes bug-fixes, and encourage our users to upgrade. The latest releases of the hpke-rs and hpke-rs-rust-crypto crates contain the following bug-fixes:\n\n## hpke-rs\n- [#127](https://github.com/cryspen/hpke-rs/pull/127): Fix `KemAlgorithm::TryFrom\u003cu16\u003e` mapping where `0x004D` incorrectly resolved to `XWingDraft06` instead of `XWingDraft06Obsolete`.\n- [#123](https://github.com/cryspen/hpke-rs/pull/123): Fix potential overflow in context counter and switch to use u64.\n- [#128](https://github.com/cryspen/hpke-rs/pull/128): Return errors when trying to use open/seal with export only ciphersuite and when using kdf export with an output that\u0027s too long (instead of truncating it)\n\nThe issue fixed in #123 was first reported by Nadim Kobeissi.\nThe issues fixed in #127 and #128 were first reported by Scott Arciszewski.\n\n## hpke-rs-rust-crypto\n- [#124](https://github.com/cryspen/hpke-rs/pull/124): Error out on x25519 0 keys\n\nThe issue fixed in #124 was first reported by Nadim Kobeissi.",
"id": "GHSA-g433-pq76-6cmf",
"modified": "2026-02-13T20:05:10Z",
"published": "2026-02-13T20:05:10Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/cryspen/hpke-rs/security/advisories/GHSA-g433-pq76-6cmf"
},
{
"type": "WEB",
"url": "https://github.com/cryspen/hpke-rs/pull/123"
},
{
"type": "WEB",
"url": "https://github.com/cryspen/hpke-rs/pull/124"
},
{
"type": "WEB",
"url": "https://github.com/cryspen/hpke-rs/pull/127"
},
{
"type": "WEB",
"url": "https://github.com/cryspen/hpke-rs/pull/128"
},
{
"type": "WEB",
"url": "https://github.com/cryspen/hpke-rs/commit/1c247b5c9aeca602ad2971c9bd49817fe2c308e6"
},
{
"type": "WEB",
"url": "https://github.com/cryspen/hpke-rs/commit/25248bd624cc0325c98a05c169a0c9aa0aced632"
},
{
"type": "WEB",
"url": "https://github.com/cryspen/hpke-rs/commit/3a8254938f43bdc4e0c9c4f987f8071f19779066"
},
{
"type": "WEB",
"url": "https://github.com/cryspen/hpke-rs/commit/b54c8bb83906331bdf4f606cafa30cd7fd20b531"
},
{
"type": "PACKAGE",
"url": "https://github.com/cryspen/hpke-rs"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Bug fixes in hpke-rs, hpke-rs-rust-crypto"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…