Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
hpke-rs and hpke-rs-rust-crypto: Critical Security Fixes
GHSA-g433-pq76-6cmf
Summary
Two important libraries used for secure data encryption have been updated to fix critical security flaws. The issues could have allowed unauthorized access to encrypted data. To stay secure, update hpke-rs and hpke-rs-rust-crypto to the latest versions.
What to do
- Update hpke-rs to version 0.6.0.
- Update hpke-rs-rust-crypto to version 0.6.0.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | hpke-rs | <= 0.6.0 | 0.6.0 |
| – | hpke-rs-rust-crypto | <= 0.6.0 | 0.6.0 |
Original title
Bug fixes in hpke-rs, hpke-rs-rust-crypto
Original description
We publish a GitHub security advisory for any releases whose CHANGELOG includes bug-fixes, and encourage our users to upgrade. The latest releases of the hpke-rs and hpke-rs-rust-crypto crates contain the following bug-fixes:
## hpke-rs
- [#127](https://github.com/cryspen/hpke-rs/pull/127): Fix `KemAlgorithm::TryFrom<u16>` mapping where `0x004D` incorrectly resolved to `XWingDraft06` instead of `XWingDraft06Obsolete`.
- [#123](https://github.com/cryspen/hpke-rs/pull/123): Fix potential overflow in context counter and switch to use u64.
- [#128](https://github.com/cryspen/hpke-rs/pull/128): Return errors when trying to use open/seal with export only ciphersuite and when using kdf export with an output that's too long (instead of truncating it)
The issue fixed in #123 was first reported by Nadim Kobeissi.
The issues fixed in #127 and #128 were first reported by Scott Arciszewski.
## hpke-rs-rust-crypto
- [#124](https://github.com/cryspen/hpke-rs/pull/124): Error out on x25519 0 keys
The issue fixed in #124 was first reported by Nadim Kobeissi.
## hpke-rs
- [#127](https://github.com/cryspen/hpke-rs/pull/127): Fix `KemAlgorithm::TryFrom<u16>` mapping where `0x004D` incorrectly resolved to `XWingDraft06` instead of `XWingDraft06Obsolete`.
- [#123](https://github.com/cryspen/hpke-rs/pull/123): Fix potential overflow in context counter and switch to use u64.
- [#128](https://github.com/cryspen/hpke-rs/pull/128): Return errors when trying to use open/seal with export only ciphersuite and when using kdf export with an output that's too long (instead of truncating it)
The issue fixed in #123 was first reported by Nadim Kobeissi.
The issues fixed in #127 and #128 were first reported by Scott Arciszewski.
## hpke-rs-rust-crypto
- [#124](https://github.com/cryspen/hpke-rs/pull/124): Error out on x25519 0 keys
The issue fixed in #124 was first reported by Nadim Kobeissi.
Vulnerability type
CWE-20
Improper Input Validation
CWE-190
Integer Overflow
CWE-697
- https://github.com/cryspen/hpke-rs/security/advisories/GHSA-g433-pq76-6cmf
- https://github.com/cryspen/hpke-rs/pull/123
- https://github.com/cryspen/hpke-rs/pull/124
- https://github.com/cryspen/hpke-rs/pull/127
- https://github.com/cryspen/hpke-rs/pull/128
- https://github.com/cryspen/hpke-rs/commit/1c247b5c9aeca602ad2971c9bd49817fe2c308...
- https://github.com/cryspen/hpke-rs/commit/25248bd624cc0325c98a05c169a0c9aa0aced6...
- https://github.com/cryspen/hpke-rs/commit/3a8254938f43bdc4e0c9c4f987f8071f197790...
- https://github.com/cryspen/hpke-rs/commit/b54c8bb83906331bdf4f606cafa30cd7fd20b5...
- https://github.com/advisories/GHSA-g433-pq76-6cmf
Published: 13 Feb 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026