{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata. Fed continuously.","feed_url":"https://feed.craftedsignal.io/products/libcrux-chacha20poly1305--0.0.8/feed.json","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cpes":[],"_cs_cves":[],"_cs_exploited":false,"_cs_has_poc":false,"_cs_poc_references":[],"_cs_products":["libcrux-chacha20poly1305 (\u003c 0.0.8)"],"_cs_severities":["medium"],"_cs_tags":["denial-of-service","availability"],"_cs_type":"advisory","_cs_vendors":["rust"],"content_html":"\u003cp\u003eA vulnerability exists in \u003ccode\u003elibcrux-chacha20poly1305\u003c/code\u003e versions prior to 0.0.8 where passing a ciphertext buffer with a length greater than \u003ccode\u003eptxt.len() + TAG_LEN\u003c/code\u003e to the \u003ccode\u003eencrypt\u003c/code\u003e or \u003ccode\u003exchacha20_poly1305::encrypt\u003c/code\u003e functions triggers a panic. If an attacker can control the length of the ciphertext buffer, this can be exploited to crash the application. The vulnerability was reported on May 19, 2026. The fix ensures that the \u003ccode\u003eencrypt\u003c/code\u003e functions no longer panic, instead writing the ciphertext and tag into the first \u003ccode\u003eptxt.len() + TAG_LEN\u003c/code\u003e bytes of the provided buffer. This prevents denial-of-service attacks by crashing applications using the vulnerable library.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eThe attacker identifies an application using a vulnerable version of \u003ccode\u003elibcrux-chacha20poly1305\u003c/code\u003e (versions \u0026lt; 0.0.8).\u003c/li\u003e\n\u003cli\u003eThe attacker locates the code where \u003ccode\u003elibcrux_chacha20poly1305::encrypt\u003c/code\u003e or \u003ccode\u003elibcrux_chacha20poly1305::xchacha20_poly1305::encrypt\u003c/code\u003e are called.\u003c/li\u003e\n\u003cli\u003eThe attacker determines how to influence the length of the ciphertext buffer passed to the vulnerable function.\u003c/li\u003e\n\u003cli\u003eThe attacker crafts a request or input that provides a ciphertext buffer length greater than \u003ccode\u003eptxt.len() + TAG_LEN\u003c/code\u003e.\u003c/li\u003e\n\u003cli\u003eThe application calls the vulnerable \u003ccode\u003eencrypt\u003c/code\u003e function with the attacker-controlled ciphertext buffer.\u003c/li\u003e\n\u003cli\u003eThe \u003ccode\u003eencrypt\u003c/code\u003e function attempts to write beyond the bounds of the intended ciphertext, causing a panic.\u003c/li\u003e\n\u003cli\u003eThe Rust runtime unwinds the stack and terminates the affected thread or process.\u003c/li\u003e\n\u003cli\u003eThe application crashes, resulting in a denial-of-service.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of this vulnerability results in a denial-of-service condition. An attacker can potentially crash any application utilizing a vulnerable version of the \u003ccode\u003elibcrux-chacha20poly1305\u003c/code\u003e library if they can control the length of the ciphertext buffer. The number of affected applications is currently unknown, but any application using the vulnerable versions of the library is susceptible. This could impact services relying on the availability of applications utilizing this library, causing service interruptions.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUpgrade the \u003ccode\u003elibcrux-chacha20poly1305\u003c/code\u003e dependency to version 0.0.8 or later to remediate the vulnerability.\u003c/li\u003e\n\u003cli\u003eMonitor application logs for unexpected crashes related to \u003ccode\u003elibcrux-chacha20poly1305\u003c/code\u003e functions.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-05-19T16:21:44Z","date_published":"2026-05-19T16:21:44Z","id":"https://feed.craftedsignal.io/briefs/2026-05-libcrux-panic/","summary":"An application that passes an overlong ciphertext buffer to `libcrux_chacha20poly1305::encrypt` or `libcrux_chacha20poly1305::xchacha20_poly1305::encrypt` can experience a panic, leading to a crash if the buffer length is attacker-controlled, affecting libcrux-chacha20poly1305 versions prior to 0.0.8.","title":"libcrux-chacha20poly1305: Potential Panic on Overlong Ciphertext Buffer","url":"https://feed.craftedsignal.io/briefs/2026-05-libcrux-panic/"}],"language":"en","title":"CraftedSignal Threat Feed — Libcrux-Chacha20poly1305 (\u003c 0.0.8)","version":"https://jsonfeed.org/version/1.1"}