Description
rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.7 to before 0.10.79, X509Ref::ocsp_responders returns OCSP responder URLs from a certificate's AIA extension as OpensslString, whose Deref<Target = str> wraps the raw bytes with str::from_utf8_unchecked. OpenSSL does not enforce that the underlying IA5String is ASCII, so a certificate with non-UTF-8 bytes in its OCSP accessLocation causes safe Rust code to construct a &str that violates the UTF-8 invariant — resulting in undefined behavior. This vulnerability is fixed in 0.10.79.
Published: 2026-05-14
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

rust-openssl, a Rust binding for OpenSSL, returned OCSP responder URLs as &str by wrapping raw bytes with str::from_utf8_unchecked when parsing the certificate's AIA extension. Because OpenSSL does not enforce that the IA5String is ASCII, a certificate containing non‑UTF‑8 bytes in its OCSP accessLocation can trigger construction of a &str that violates the UTF‑8 invariant, resulting in undefined behavior. If exploited, this could corrupt memory, cause a crash, or potentially allow an attacker to execute arbitrary code within the process that uses the vulnerable library.

Affected Systems

The vulnerability affects the rust‑openssl crate versions 0.9.7 up to and including 0.10.78. Systems that compile or link against any of these versions—particularly applications that handle X509 certificates with OCSP URLs—are impacted. The fix is included in version 0.10.79 and later.

Risk and Exploitability

The CVSS score is 8.7, indicating a high severity that would be classed as "Critical" in many contexts. The EPSS score is not available, but the lack of a KEV listing does not preclude exploitation, especially in environments that use untrusted certificates. Based on the description, the likely attack vector is a local or remote delivery of a crafted certificate with non‑UTF‑8 OCSP URLs to a vulnerable application that processes X509 certificates via rust‑openssl. The undefined behavior induced by the unchecked conversion could be leveraged to cause a crash or, in a sophisticated scenario, to manipulate program control flow and achieve code execution. The vulnerability is already fixed in a later library version, so the primary vector is unpatched usage.

Generated by OpenCVE AI on May 14, 2026 at 21:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the rust-openssl crate to version 0.10.79 or later, ensuring that Cargo.lock reflects the updated dependency
  • Recompile affected applications against the fixed library and perform regression testing to verify stability
  • For environments that cannot immediately upgrade, validate or sanitize OCSP URLs prior to passing certificates to rust-openssl, or replace the library with a vetted alternative

Generated by OpenCVE AI on May 14, 2026 at 21:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xp3w-r5p5-63rr rust-openssl has undefined behavior in X509Ref::ocsp_responders for certificates with non-UTF-8 OCSP URLs
History

Fri, 15 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.7 to before 0.10.79, X509Ref::ocsp_responders returns OCSP responder URLs from a certificate's AIA extension as OpensslString, whose Deref<Target = str> wraps the raw bytes with str::from_utf8_unchecked. OpenSSL does not enforce that the underlying IA5String is ASCII, so a certificate with non-UTF-8 bytes in its OCSP accessLocation causes safe Rust code to construct a &str that violates the UTF-8 invariant — resulting in undefined behavior. This vulnerability is fixed in 0.10.79.
Title rust-openssl: undefined behavior in X509Ref::ocsp_responders for certificates with non-UTF-8 OCSP URLs
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-15T18:05:15.921Z

Reserved: 2026-04-26T12:37:18.171Z

Link: CVE-2026-42327

cve-icon Vulnrichment

Updated: 2026-05-15T16:28:52.292Z

cve-icon NVD

Status : Deferred

Published: 2026-05-14T21:16:45.430

Modified: 2026-05-15T14:55:57.710

Link: CVE-2026-42327

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T21:30:12Z

Weaknesses