Skip to content

Commit b5c78ee

Browse files
1 parent 8262340 commit b5c78ee

4 files changed

Lines changed: 42 additions & 9 deletions

File tree

advisories/github-reviewed/2026/02/GHSA-g433-pq76-6cmf/GHSA-g433-pq76-6cmf.json

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g433-pq76-6cmf",
4-
"modified": "2026-02-13T20:05:10Z",
4+
"modified": "2026-03-25T21:37:22Z",
55
"published": "2026-02-13T20:05:10Z",
66
"aliases": [],
77
"summary": "Bug fixes in hpke-rs, hpke-rs-rust-crypto",
88
"details": "We publish a GitHub security advisory for any releases whose CHANGELOG includes bug-fixes, and encourage our users to upgrade. The latest releases of the hpke-rs and hpke-rs-rust-crypto crates contain the following bug-fixes:\n\n## hpke-rs\n- [#127](https://github.com/cryspen/hpke-rs/pull/127): Fix `KemAlgorithm::TryFrom<u16>` mapping where `0x004D` incorrectly resolved to `XWingDraft06` instead of `XWingDraft06Obsolete`.\n- [#123](https://github.com/cryspen/hpke-rs/pull/123): Fix potential overflow in context counter and switch to use u64.\n- [#128](https://github.com/cryspen/hpke-rs/pull/128): Return errors when trying to use open/seal with export only ciphersuite and when using kdf export with an output that's too long (instead of truncating it)\n\nThe issue fixed in #123 was first reported by Nadim Kobeissi.\nThe issues fixed in #127 and #128 were first reported by Scott Arciszewski.\n\n## hpke-rs-rust-crypto\n- [#124](https://github.com/cryspen/hpke-rs/pull/124): Error out on x25519 0 keys\n\nThe issue fixed in #124 was first reported by Nadim Kobeissi.",
9-
"severity": [],
9+
"severity": [
10+
{
11+
"type": "CVSS_V4",
12+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
13+
}
14+
],
1015
"affected": [
1116
{
1217
"package": {
@@ -87,6 +92,14 @@
8792
{
8893
"type": "PACKAGE",
8994
"url": "https://github.com/cryspen/hpke-rs"
95+
},
96+
{
97+
"type": "WEB",
98+
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0070.html"
99+
},
100+
{
101+
"type": "WEB",
102+
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0072.html"
90103
}
91104
],
92105
"database_specific": {
@@ -95,7 +108,7 @@
95108
"CWE-20",
96109
"CWE-697"
97110
],
98-
"severity": "MODERATE",
111+
"severity": "HIGH",
99112
"github_reviewed": true,
100113
"github_reviewed_at": "2026-02-13T20:05:10Z",
101114
"nvd_published_at": null

advisories/github-reviewed/2026/03/GHSA-4fcp-jxh7-23x8/GHSA-4fcp-jxh7-23x8.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4fcp-jxh7-23x8",
4-
"modified": "2026-03-19T21:18:42Z",
4+
"modified": "2026-03-25T21:35:31Z",
55
"published": "2026-03-19T12:50:57Z",
66
"aliases": [
77
"CVE-2026-33320"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/TomWright/dasel/security/advisories/GHSA-4fcp-jxh7-23x8"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33320"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/TomWright/dasel"
@@ -52,6 +56,6 @@
5256
"severity": "MODERATE",
5357
"github_reviewed": true,
5458
"github_reviewed_at": "2026-03-19T12:50:57Z",
55-
"nvd_published_at": null
59+
"nvd_published_at": "2026-03-24T01:17:02Z"
5660
}
5761
}

advisories/github-reviewed/2026/03/GHSA-f27w-vcwj-c954/GHSA-f27w-vcwj-c954.json

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f27w-vcwj-c954",
4-
"modified": "2026-03-19T17:54:17Z",
4+
"modified": "2026-03-25T21:36:33Z",
55
"published": "2026-03-19T17:54:17Z",
66
"aliases": [
77
"CVE-2026-33306"
@@ -43,9 +43,25 @@
4343
"type": "WEB",
4444
"url": "https://github.com/bcrypt-ruby/bcrypt-ruby/security/advisories/GHSA-f27w-vcwj-c954"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33306"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://github.com/bcrypt-ruby/bcrypt-ruby/commit/831ce64cb0a9502130fa93a28bfd9527a5fa45c4"
53+
},
4654
{
4755
"type": "PACKAGE",
4856
"url": "https://github.com/bcrypt-ruby/bcrypt-ruby"
57+
},
58+
{
59+
"type": "WEB",
60+
"url": "https://github.com/bcrypt-ruby/bcrypt-ruby/releases/tag/v3.1.22"
61+
},
62+
{
63+
"type": "WEB",
64+
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bcrypt/CVE-2026-33306.yml"
4965
}
5066
],
5167
"database_specific": {
@@ -55,6 +71,6 @@
5571
"severity": "MODERATE",
5672
"github_reviewed": true,
5773
"github_reviewed_at": "2026-03-19T17:54:17Z",
58-
"nvd_published_at": null
74+
"nvd_published_at": "2026-03-24T01:17:02Z"
5975
}
6076
}

advisories/github-reviewed/2026/03/GHSA-h8vw-ph9r-xpch/GHSA-h8vw-ph9r-xpch.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-h8vw-ph9r-xpch",
4-
"modified": "2026-03-20T21:35:26Z",
4+
"modified": "2026-03-25T21:35:16Z",
55
"published": "2026-03-19T16:28:04Z",
66
"aliases": [
77
"CVE-2026-30924"
@@ -28,7 +28,7 @@
2828
"introduced": "0"
2929
},
3030
{
31-
"last_affected": "1.14.1"
31+
"fixed": "1.15.0"
3232
}
3333
]
3434
}

0 commit comments

Comments
 (0)