-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stemmed from incorrect buffer size calculation in sm2_plaintext_size, which was called during the first EVP_PKEY_decrypt invocation. The function used cryptographic parameters rather than parsing actual ciphertext, leading to undersized allocations. pkey_sm2_decrypt facilitated this incorrect calculation by passing the wrong parameters. The patch fundamentally changes both the function signature and implementation to properly parse ciphertext structure.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| openssl-src | rust | < 111.16.0 | 111.16.0 |
Ongoing coverage of React2Shell