No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xmgf-hq76-4vx2 | rust-opennssl has an Out-of-bounds read in PEM password callback when returning an oversized length |
Fri, 24 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.0 to before 0.10.78, the *_from_pem_callback APIs did not validate the length returned by the user's callback. A password callback that returns a value larger than the buffer it was given can cause some versions of OpenSSL to over-read this buffer. OpenSSL 3.x is not affected by this. This vulnerability is fixed in 0.10.78. | |
| Title | rust-openssl: Out-of-bounds read in PEM password callback when user callback returns an oversized length | |
| Weaknesses | CWE-125 CWE-1284 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-24T18:02:27.756Z
Reserved: 2026-04-22T03:53:24.406Z
Link: CVE-2026-41677
Updated: 2026-04-24T18:02:24.370Z
Status : Received
Published: 2026-04-24T18:16:29.270
Modified: 2026-04-24T18:16:29.270
Link: CVE-2026-41677
No data.
OpenCVE Enrichment
No data.
Github GHSA