Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Supranational
Supranational blst |
|
| Vendors & Products |
Supranational
Supranational blst |
Thu, 19 Feb 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | github.com/supranational/blst: blst cryptographic library: Denial of Service via out-of-bounds stack write in key generation | Github.com/supranational/blst: blst cryptographic library: denial of service via out-of-bounds stack write in key generation |
| References |
|
Thu, 19 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the blst cryptographic library. This out-of-bounds stack write vulnerability, specifically in the blst_sha256_bcopy assembly routine, occurs due to a missing zero-length guard. A remote attacker can exploit this by providing a zero-length salt parameter to key generation functions, such as blst_keygen_v5(), if the application exposes this functionality. Successful exploitation leads to memory corruption and immediate process termination, resulting in a denial-of-service (DoS) condition. | |
| Title | github.com/supranational/blst: blst cryptographic library: Denial of Service via out-of-bounds stack write in key generation | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: fedora
Published:
Updated: 2026-02-19T06:58:47.090Z
Reserved: 2026-02-18T12:19:32.190Z
Link: CVE-2026-2681
No data.
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:20:54Z