CVE-2026-41678

Public on 2026-04-24
Modified on 2026-04-28
Description
rust-openssl provides OpenSSL bindings for the Rust programming language. From to before 0.10.78, aes::unwrap_key() contains an incorrect assertion: it checks that out.len() + 8 <= in_.len(), but this condition is reversed. The intended invariant is out.len() >= in_.len() - 8, ensuring the output buffer is large enough. Because of the inverted check, the function only accepts buffers at or below the minimum required size and rejects larger ones. If a smaller buffer is provided the function will write past the end of out by in_.len() - 8 - out.len() bytes, causing an out-of-bounds write from a safe public function. This vulnerability is fixed in 0.10.78.
Severity
Medium severity
Medium
See what this means
CVSS v3 Base Score
6.7
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 2 - Aws-nitro-enclaves-cli Extra aws-nitro-enclaves-cli Pending Fix
Amazon Linux 2023 aws-nitro-enclaves-cli Pending Fix
Amazon Linux 2023 aws-nitro-tpm-tools Pending Fix
Amazon Linux 2 - Core clamav1.4 Pending Fix
Amazon Linux 2023 clamav1.4 Pending Fix
Amazon Linux 2023 clamav1.5 Pending Fix
Amazon Linux 2 - Firefox Extra firefox Pending Fix
Amazon Linux 2023 firefox Pending Fix
Amazon Linux 2 - Core gjs Pending Fix
Amazon Linux 2023 gjs Pending Fix
Amazon Linux 2023 mount-s3 Pending Fix
Amazon Linux 2023 papers Pending Fix
Amazon Linux 2 - Core polkit Pending Fix
Amazon Linux 2023 polkit Pending Fix
Amazon Linux 2 - Core rust Pending Fix
Amazon Linux 2023 rust Pending Fix
Amazon Linux 2 - Core thunderbird Pending Fix

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H