Heap and Stack Overflow in Rust OpenSSL Binding Due to Incorrect Length Handling
CVE-2026-41676
7.2HIGH
What is CVE-2026-41676?
The vulnerability arises from the rust-openssl library, which doesn't properly handle lengths when deriving keys using EVP_PKEY_derive function in OpenSSL 1.1.x. This oversight can lead to a heap or stack overflow if a caller supplies a slice shorter than the required key length. The issue is mitigated in OpenSSL 3.x, which implements checks, making this vulnerability a concern mainly for users of older OpenSSL versions. The vulnerable versions of rust-openssl are from 0.9.27 to before 0.10.78, and users are advised to upgrade to at least version 0.10.78 to mitigate risk.
Affected Version(s)
rust-openssl >= 0.9.27, < 0.10.78
