Debian Rust-Aes-Gcm vulnerabilities
2 known vulnerabilities affecting debian/rust-aes-gcm.
Total CVEs
2
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
LOW2
Vulnerabilities
Page 1 of 1
CVE-2025-27498LOWCVSS 5.62025
CVE-2025-27498 [MEDIUM] CVE-2025-27498: rust-aes-gcm - aes-gcm is a pure Rust implementation of the AES-GCM. In decrypt_in_place_detach...
aes-gcm is a pure Rust implementation of the AES-GCM. In decrypt_in_place_detached, the decrypted ciphertext (which is the correct ciphertext) is exposed even if the tag is incorrect. This is because in decrypt_inplace in asconcore.rs, tag verification causes an error to be returned with the plaintext contents still in buffer. The vulnerability is fixed in 0.
debian
CVE-2023-42811LOWCVSS 4.72023
CVE-2023-42811 [MEDIUM] CVE-2023-42811: rust-aes-gcm - aes-gcm is a pure Rust implementation of the AES-GCM. Starting in version 0.10.0...
aes-gcm is a pure Rust implementation of the AES-GCM. Starting in version 0.10.0 and prior to version 0.10.3, in the AES GCM implementation of decrypt_in_place_detached, the decrypted ciphertext (i.e. the correct plaintext) is exposed even if tag verification fails. If a program using the `aes-gcm` crate's `decrypt_in_place*` APIs accesses the buffer after de
debian