๐Ÿ” CVE Alert

CVE-2026-41676

UNKNOWN 0.0

rust-openssl: Deriver::derive and PkeyCtxRef::derive can overflow short buffers on OpenSSL 1.1.1

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.27 to before 0.10.78, Deriver::derive (and PkeyCtxRef::derive) sets len = buf.len() and passes it as the in/out length to EVP_PKEY_derive, relying on OpenSSL to honor it. On OpenSSL 1.1.x, X25519, X448, DH and HKDF-extract ignore the incoming *keylen, unconditionally writing the full shared secret (32/56/prime-size bytes). A caller passing a short slice gets a heap/stack overflow from safe code. OpenSSL 3.x providers do check, so this only impacts older OpenSSL. This vulnerability is fixed in 0.10.78.

CWE CWE-787 CWE-131
Vendor rust-openssl
Product rust-openssl
Published Apr 24, 2026
Last Updated Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for rust-openssl rust-openssl

Be the first to know when new unknown vulnerabilities affecting rust-openssl rust-openssl are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

rust-openssl / rust-openssl
>= 0.9.27, < 0.10.78

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/rust-openssl/rust-openssl/security/advisories/GHSA-pqf5-4pqq-29f5