Description
A flaw was found in the blst cryptographic library. This out-of-bounds stack write vulnerability, specifically in the blst_sha256_bcopy assembly routine, occurs due to a missing zero-length guard. A remote attacker can exploit this by providing a zero-length salt parameter to key generation functions, such as blst_keygen_v5(), if the application exposes this functionality. Successful exploitation leads to memory corruption and immediate process termination, resulting in a denial-of-service (DoS) condition.
Published: 2026-02-19
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Assess Impact
AI Analysis

Impact

A flaw in the blst cryptographic library’s blst_sha256_bcopy assembly routine allows an out‑of‑bounds stack write due to a missing zero‑length guard. When a calling application supplies a zero‑length salt to key‑generation functions such as blst_keygen_v5(), the stack is corrupted and the process terminates immediately, providing a classic denial‑of‑service. Based on the description, it is inferred that any attacker who can invoke this functionality can force a crash.

Affected Systems

The vulnerability affects the blst library maintained by supranational on GitHub. No specific version numbers are listed, so all releases in which this recipe exists are potentially impacted. Applications that embed this library and expose key‑generation functions are at risk.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, while the EPSS score of <1% reflects a very low current exploitation probability. It is not catalogued in CISA’s KEV list. Exploitation requires remote or local access to a key‑generation API that accepts a zero‑length salt; without such exposure the risk is limited. The impact is limited to service interruption, as it does not provide confidentiality or integrity compromise.

Generated by OpenCVE AI on April 18, 2026 at 11:50 UTC.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.


OpenCVE Recommended Actions

  • Apply the vendor’s patch to blst as soon as it becomes available.
  • Ensure your application never passes a zero‑length salt to blst_keygen_v5() or any key‑generation routine in the library.
  • Monitor application logs for abrupt crashes and restrict access to key‑generation functions to trusted users or processes.

Generated by OpenCVE AI on April 18, 2026 at 11:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Supranational
Supranational blst
Vendors & Products Supranational
Supranational blst

Thu, 19 Feb 2026 07:15:00 +0000

Type Values Removed Values Added
Title github.com/supranational/blst: blst cryptographic library: Denial of Service via out-of-bounds stack write in key generation Github.com/supranational/blst: blst cryptographic library: denial of service via out-of-bounds stack write in key generation
References

Thu, 19 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in the blst cryptographic library. This out-of-bounds stack write vulnerability, specifically in the blst_sha256_bcopy assembly routine, occurs due to a missing zero-length guard. A remote attacker can exploit this by providing a zero-length salt parameter to key generation functions, such as blst_keygen_v5(), if the application exposes this functionality. Successful exploitation leads to memory corruption and immediate process termination, resulting in a denial-of-service (DoS) condition.
Title github.com/supranational/blst: blst cryptographic library: Denial of Service via out-of-bounds stack write in key generation
Weaknesses CWE-787
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}

threat_severity

Moderate


Subscriptions

Supranational Blst
cve-icon MITRE

Status: PUBLISHED

Assigner: fedora

Published:

Updated: 2026-02-19T21:32:34.940Z

Reserved: 2026-02-18T12:19:32.190Z

Link: CVE-2026-2681

cve-icon Vulnrichment

Updated: 2026-02-19T21:32:27.208Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T07:17:47.270

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2681

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-18T00:00:00Z

Links: CVE-2026-2681 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T12:00:05Z

Weaknesses