CVE-2026-41676

Public on 2026-04-24
Modified on 2026-04-28
Description
rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.27 to before 0.10.78, Deriver::derive (and PkeyCtxRef::derive) sets len = buf.len() and passes it as the in/out length to EVP_PKEY_derive, relying on OpenSSL to honor it. On OpenSSL 1.1.x, X25519, X448, DH and HKDF-extract ignore the incoming *keylen, unconditionally writing the full shared secret (32/56/prime-size bytes). A caller passing a short slice gets a heap/stack overflow from safe code. OpenSSL 3.x providers do check, so this only impacts older OpenSSL. This vulnerability is fixed in 0.10.78.
Severity
Medium severity
Medium
See what this means
CVSS v3 Base Score
6.5
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 2 - Aws-nitro-enclaves-cli Extra aws-nitro-enclaves-cli Pending Fix
Amazon Linux 2023 aws-nitro-enclaves-cli Not Affected
Amazon Linux 2023 aws-nitro-tpm-tools Not Affected
Amazon Linux 2 - Core clamav1.4 Pending Fix
Amazon Linux 2023 clamav1.4 Not Affected
Amazon Linux 2023 clamav1.5 Not Affected
Amazon Linux 2 - Firefox Extra firefox Pending Fix
Amazon Linux 2023 firefox Not Affected
Amazon Linux 2023 gjs Not Affected
Amazon Linux 2023 mount-s3 Not Affected
Amazon Linux 2023 papers Not Affected
Amazon Linux 2023 polkit Not Affected
Amazon Linux 2 - Core rust Pending Fix
Amazon Linux 2023 rust Not Affected
Amazon Linux 2 - Core thunderbird Pending Fix

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H