Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-41676

rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.27 to before 0.10.78, Deriver::derive (and PkeyCtxRef::derive) sets len = buf.len() and passes it as the in/out length to EVP_PKEY_derive, relying on OpenSSL to honor it. On OpenSSL 1.1.x, X25519, X448, DH and HKDF-extract ignore the incoming *keylen, unconditionally writing the full shared secret (32/56/prime-size bytes). A caller passing a short slice gets a heap/stack overflow from safe code. OpenSSL 3.x providers do check, so this only impacts older OpenSSL. This vulnerability is fixed in 0.10.78.

View on NVD

Analysis

Rust developers using the rust-openssl crate should update to version 0.10.78 immediately. A vulnerability in the key derivation functions can cause memory corruption (heap or stack overflows) when using OpenSSL 1.1.x, potentially leading to remote code execution. This is particularly dangerous because it occurs in code usually assumed to be memory-safe by the Rust compiler.

Severity

Score: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-131CWE-787

EPSS

Probability of exploitation (next 30 days): 0.0006 (0.1%)
Percentile: 18.6%
EPSS: 2026-05-06

Affects

rust-openssl_project:rust-openssl

Technical description

rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.27 to before 0.10.78, Deriver::derive (and PkeyCtxRef::derive) sets len = buf.len() and passes it as the in/out length to EVP_PKEY_derive, relying on OpenSSL to honor it. On OpenSSL 1.1.x, X25519, X448, DH and HKDF-extract ignore the incoming *keylen, unconditionally writing the full shared secret (32/56/prime-size bytes). A caller passing a short slice gets a heap/stack overflow from safe code. OpenSSL 3.x providers do check, so this only impacts older OpenSSL. This vulnerability is fixed in 0.10.78.

Published: 4/24/2026, 6:16:29 PM
Last modified: 4/28/2026, 5:30:42 PM

References

HomeEventsBlogResourcesTeam