A flaw was found in the blst cryptographic library. This out-of-bounds stack write vulnerability, specifically in the blst_sha256_bcopy assembly routine, occurs due to a missing zero-length guard. A remote attacker can exploit this by providing a zero-length salt parameter to key generation functions, such as blst_keygen_v5(), if the application exposes this functionality. Successful exploitation leads to memory corruption and immediate process termination, resulting in a denial-of-service (DoS) condition.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Supranational
Supranational blst |
|
| Vendors & Products |
Supranational
Supranational blst |
Thu, 19 Feb 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | github.com/supranational/blst: blst cryptographic library: Denial of Service via out-of-bounds stack write in key generation | Github.com/supranational/blst: blst cryptographic library: denial of service via out-of-bounds stack write in key generation |
| References |
|
Thu, 19 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the blst cryptographic library. This out-of-bounds stack write vulnerability, specifically in the blst_sha256_bcopy assembly routine, occurs due to a missing zero-length guard. A remote attacker can exploit this by providing a zero-length salt parameter to key generation functions, such as blst_keygen_v5(), if the application exposes this functionality. Successful exploitation leads to memory corruption and immediate process termination, resulting in a denial-of-service (DoS) condition. | |
| Title | github.com/supranational/blst: blst cryptographic library: Denial of Service via out-of-bounds stack write in key generation | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: fedora
Published: 2026-02-19T06:58:47.090Z
Updated: 2026-02-19T06:58:47.090Z
Reserved: 2026-02-18T12:19:32.190Z
Link: CVE-2026-2681
No data.
Status : Received
Published: 2026-02-19T07:17:47.270
Modified: 2026-02-19T07:17:47.270
Link: CVE-2026-2681