RUSTSEC-2021-0057

Integer overflow in CipherUpdate

Issued
Package
openssl-src (crates.io)
Type
Vulnerability
Categories
  • denial-of-service
Aliases
Details
https://www.openssl.org/news/secadv/20210216.txt
Patched
  • >=111.14.0

Description

Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash.

More