HistoryEditJSON (OSV)

RUSTSEC-2026-0023

X25519 secret validation did not check buffer length or clamping

Reported
Issued
Package
libcrux-ecdh (crates.io)
Type
Vulnerability
Aliases
References
CVSS Score
0 NONE
CVSS Details
Attack Complexity
Low
Attack Requirements
None
Attack Vector
Network
Privileges Required
None
Availability Impact to the Subsequent System
None
Confidentiality Impact to the Subsequent System
None
Integrity Impact to the Subsequent System
None
User Interaction
None
Availability Impact to the Vulnerable System
None
Confidentiality Impact to the Vulnerable System
None
Integrity Impact to the Vulnerable System
None
CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
Patched
  • >=0.0.6
Affected Functions
Version
libcrux_ecdh::validate_scalar
  • <=0.0.5

Description

The latest releases of the libcrux-ecdh crate contains the following bug-fix:

#1301: Check length and clamping in X25519 secret validation. This is a breaking change since errors are now raised on unclamped X25519 secrets or inputs of the wrong length

Advisory available under CC0-1.0 license.