CVE-2026-41677

Public on 2026-04-24
Modified on 2026-05-14
Description
rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.0 to before 0.10.78, the *_from_pem_callback APIs did not validate the length returned by the user's callback. A password callback that returns a value larger than the buffer it was given can cause some versions of OpenSSL to over-read this buffer. OpenSSL 3.x is not affected by this. This vulnerability is fixed in 0.10.78.
Severity
Low severity
Low
See what this means
CVSS v3 Base Score
3.7
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 2 - Aws-nitro-enclaves-cli Extra aws-nitro-enclaves-cli Pending Fix
Amazon Linux 2023 aws-nitro-enclaves-cli Pending Fix
Amazon Linux 2023 aws-nitro-tpm-tools Not Affected
Amazon Linux 2 - Core clamav1.4 Not Affected
Amazon Linux 2023 clamav1.5 Pending Fix
Amazon Linux 2 - Firefox Extra firefox Not Affected
Amazon Linux 2023 firefox Not Affected
Amazon Linux 2023 gjs Not Affected
Amazon Linux 2023 mount-s3 Not Affected
Amazon Linux 2023 papers Not Affected
Amazon Linux 2 - Core rust Pending Fix
Amazon Linux 2023 rust Pending Fix
Amazon Linux 2 - Core thunderbird Not Affected

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
NVD CVSSv3 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H