Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-ghm9-cr32-g9qj | rust-openssl: rustMdCtxRef::digest_final() writes past caller buffer with no length check |
Tue, 28 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:rust-openssl_project:rust-openssl:*:*:*:*:*:rust:*:* | |
| Metrics |
cvssV3_1
|
Tue, 28 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rust-openssl Project
Rust-openssl Project rust-openssl |
|
| Vendors & Products |
Rust-openssl Project
Rust-openssl Project rust-openssl |
Fri, 24 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.10.39 to before 0.10.78, EVP_DigestFinal() always writes EVP_MD_CTX_size(ctx) to the out buffer. If out is smaller than that, MdCtxRef::digest_final() writes past its end, usually corrupting the stack. This is reachable from safe Rust. This vulnerability is fixed in 0.10.78. | |
| Title | rust-openssl: MdCtxRef::digest_final() writes past caller buffer with no length check | |
| Weaknesses | CWE-121 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-24T17:42:54.765Z
Reserved: 2026-04-22T03:53:24.406Z
Link: CVE-2026-41681
Updated: 2026-04-24T17:42:51.659Z
Status : Analyzed
Published: 2026-04-24T18:16:29.717
Modified: 2026-04-28T17:44:16.670
Link: CVE-2026-41681
No data.
OpenCVE Enrichment
Updated: 2026-04-28T08:45:26Z
Github GHSA