Heap and Stack Overflow in Rust OpenSSL Binding Due to Incorrect Length Handling
CVE-2026-41676

7.2HIGH

Key Information:

Vendor
CVE Published:
24 April 2026

What is CVE-2026-41676?

The vulnerability arises from the rust-openssl library, which doesn't properly handle lengths when deriving keys using EVP_PKEY_derive function in OpenSSL 1.1.x. This oversight can lead to a heap or stack overflow if a caller supplies a slice shorter than the required key length. The issue is mitigated in OpenSSL 3.x, which implements checks, making this vulnerability a concern mainly for users of older OpenSSL versions. The vulnerable versions of rust-openssl are from 0.9.27 to before 0.10.78, and users are advised to upgrade to at least version 0.10.78 to mitigate risk.

Affected Version(s)

rust-openssl >= 0.9.27, < 0.10.78

References

CVSS V4

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.