Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xmgf-hq76-4vx2 | rust-opennssl has an Out-of-bounds read in PEM password callback when returning an oversized length |
Tue, 28 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:rust-openssl_project:rust-openssl:*:*:*:*:*:rust:*:* | |
| Metrics |
cvssV3_1
|
Tue, 28 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rust-openssl Project
Rust-openssl Project rust-openssl |
|
| Vendors & Products |
Rust-openssl Project
Rust-openssl Project rust-openssl |
Fri, 24 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.0 to before 0.10.78, the *_from_pem_callback APIs did not validate the length returned by the user's callback. A password callback that returns a value larger than the buffer it was given can cause some versions of OpenSSL to over-read this buffer. OpenSSL 3.x is not affected by this. This vulnerability is fixed in 0.10.78. | |
| Title | rust-openssl: Out-of-bounds read in PEM password callback when user callback returns an oversized length | |
| Weaknesses | CWE-125 CWE-1284 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-24T18:02:27.756Z
Reserved: 2026-04-22T03:53:24.406Z
Link: CVE-2026-41677
Updated: 2026-04-24T18:02:24.370Z
Status : Analyzed
Published: 2026-04-24T18:16:29.270
Modified: 2026-04-28T17:34:03.913
Link: CVE-2026-41677
No data.
OpenCVE Enrichment
Updated: 2026-04-28T08:45:26Z
Github GHSA