| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| openssl-src | rust |
| >= 300.0.0, < 300.0.9 |
| 300.0.9 |
| openssl-src | rust | < 111.22.0 | 111.22.0 |
The commit diffs show critical changes in loop control logic within the AES-NI assembly implementation. The 'jb' -> 'jbe' modification in two locations of aesni-x86.pl's grandloop indicates an off-by-one error in block processing. This matches the vulnerability description of failing to encrypt full data in specific circumstances, particularly when data length aligns with block boundaries. The direct correlation between the patch and described vulnerability mechanism confirms the function's role.
KEV Misses 88% of Exploited CVEs- Get the report