Description
rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.27 to before 0.10.78, Deriver::derive (and PkeyCtxRef::derive) sets len = buf.len() and passes it as the in/out length to EVP_PKEY_derive, relying on OpenSSL to honor it. On OpenSSL 1.1.x, X25519, X448, DH and HKDF-extract ignore the incoming *keylen, unconditionally writing the full shared secret (32/56/prime-size bytes). A caller passing a short slice gets a heap/stack overflow from safe code. OpenSSL 3.x providers do check, so this only impacts older OpenSSL. This vulnerability is fixed in 0.10.78.
INFO
Published Date :
2026-04-24T17:16:20.539Z
Last Modified :
2026-04-24T17:43:20.693Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-41676 vulnerability.
| Vendors | Products |
|---|---|
| Rust-openssl Project |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-41676.