Vulnerability Description
rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.24 to before 0.10.78, the FFI trampolines behind SslContextBuilder::set_psk_client_callback, set_psk_server_callback, set_cookie_generate_cb, and set_stateless_cookie_generate_cb forwarded the user closure's returned usize directly to OpenSSL without checking it against the &mut [u8] that was handed to the closure. This can lead to buffer overflows and other unintended consequences. This vulnerability is fixed in 0.10.78.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rust-Openssl Project | Rust-Openssl | >= 0.9.24, < 0.10.78 |
Related Weaknesses (CWE)
References
- https://github.com/rust-openssl/rust-openssl/commit/1d109020d98fff2fb2e45c39a373Patch
- https://github.com/rust-openssl/rust-openssl/pull/2607Issue Tracking
- https://github.com/rust-openssl/rust-openssl/releases/tag/openssl-v0.10.78Release Notes
- https://github.com/rust-openssl/rust-openssl/security/advisories/GHSA-hppc-g8h3-Vendor Advisory
FAQ
What is CVE-2026-41898?
CVE-2026-41898 is a vulnerability with a CVSS score of 9.8 (CRITICAL). rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.24 to before 0.10.78, the FFI trampolines behind SslContextBuilder::set_psk_client_callback, set_psk_server_callback...
How severe is CVE-2026-41898?
CVE-2026-41898 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-41898?
Check the references section above for vendor advisories and patch information. Affected products include: Rust-Openssl Project Rust-Openssl.