Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-41898

rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.24 to before 0.10.78, the FFI trampolines behind SslContextBuilder::set_psk_client_callback, set_psk_server_callback, set_cookie_generate_cb, and set_stateless_cookie_generate_cb forwarded the user closure's returned usize directly to OpenSSL without checking it against the &mut [u8] that was handed to the closure. This can lead to buffer overflows and other unintended consequences. This vulnerability is fixed in 0.10.78.

Ver en NVD

Análisis

A critical vulnerability in the rust-openssl crate (versions 0.9.24 to 0.10.77) allows for buffer overflows during TLS handshakes. The FFI layer fails to validate lengths returned by user closures when using PSK or stateless cookie callbacks, leading to potential memory corruption. Rust developers using these specific features should upgrade to version 0.10.78.

Severidad

Puntaje: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-126CWE-130

EPSS

Probabilidad de explotación (próx. 30 días): 0.0006 (0.1%)
Percentil: 17.7%
EPSS: 2026-05-06

Afecta

rust-openssl_project:rust-openssl

Descripción técnica

rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.24 to before 0.10.78, the FFI trampolines behind SslContextBuilder::set_psk_client_callback, set_psk_server_callback, set_cookie_generate_cb, and set_stateless_cookie_generate_cb forwarded the user closure's returned usize directly to OpenSSL without checking it against the &mut [u8] that was handed to the closure. This can lead to buffer overflows and other unintended consequences. This vulnerability is fixed in 0.10.78.

Publicada: 24/4/2026, 18:16:29
Última modificación: 28/4/2026, 17:45:23

Referencias

InicioEventosBlogRecursosEquipo