CVE-2026-41677

Public on 2026-04-24
Modified on 2026-04-28
Description
rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.0 to before 0.10.78, the *_from_pem_callback APIs did not validate the length returned by the user's callback. A password callback that returns a value larger than the buffer it was given can cause some versions of OpenSSL to over-read this buffer. OpenSSL 3.x is not affected by this. This vulnerability is fixed in 0.10.78.
Severity
Low severity
Low
See what this means
CVSS v3 Base Score
3.7
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 2 - Aws-nitro-enclaves-cli Extra aws-nitro-enclaves-cli Pending Fix
Amazon Linux 2023 aws-nitro-enclaves-cli Pending Fix
Amazon Linux 2023 aws-nitro-tpm-tools Pending Fix
Amazon Linux 2 - Core clamav1.4 Pending Fix
Amazon Linux 2023 clamav1.4 Pending Fix
Amazon Linux 2023 clamav1.5 Pending Fix
Amazon Linux 2 - Firefox Extra firefox Pending Fix
Amazon Linux 2023 firefox Pending Fix
Amazon Linux 2 - Core gjs Pending Fix
Amazon Linux 2023 gjs Pending Fix
Amazon Linux 2023 mount-s3 Pending Fix
Amazon Linux 2023 papers Pending Fix
Amazon Linux 2 - Core polkit Pending Fix
Amazon Linux 2023 polkit Pending Fix
Amazon Linux 2 - Core rust Pending Fix
Amazon Linux 2023 rust Pending Fix
Amazon Linux 2 - Core thunderbird Pending Fix

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N