rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.0 to before 0.10.78, the *_from_pem_callback APIs did not validate the length returned by the user's callback. A password callback that returns a value larger than the buffer it was given can cause some versions of OpenSSL to over-read this buffer. OpenSSL 3.x is not affected by this. This vulnerability is fixed in 0.10.78.
Metrics
Affected Vendors & Products
References
History
Tue, 28 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:rust-openssl_project:rust-openssl:*:*:*:*:*:rust:*:* | |
| Metrics |
cvssV3_1
|
Tue, 28 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rust-openssl Project
Rust-openssl Project rust-openssl |
|
| Vendors & Products |
Rust-openssl Project
Rust-openssl Project rust-openssl |
Fri, 24 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.0 to before 0.10.78, the *_from_pem_callback APIs did not validate the length returned by the user's callback. A password callback that returns a value larger than the buffer it was given can cause some versions of OpenSSL to over-read this buffer. OpenSSL 3.x is not affected by this. This vulnerability is fixed in 0.10.78. | |
| Title | rust-openssl: Out-of-bounds read in PEM password callback when user callback returns an oversized length | |
| Weaknesses | CWE-125 CWE-1284 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-04-24T17:17:17.849Z
Updated: 2026-04-24T18:02:27.756Z
Reserved: 2026-04-22T03:53:24.406Z
Link: CVE-2026-41677
Updated: 2026-04-24T18:02:24.370Z
Status : Analyzed
Published: 2026-04-24T18:16:29.270
Modified: 2026-04-28T17:34:03.913
Link: CVE-2026-41677
No data.
ReportizFlow