Debian Package Tracker
Register | Log in
Subscribe

rust-openssl

Choose email to subscribe with

general
  • source: rust-openssl (main)
  • version: 0.10.78-1
  • maintainer: Debian Rust Maintainers (archive) (DMD)
  • uploaders: Ximin Luo [DMD]
  • arch: any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.10.29-1
  • o-o-sec: 0.10.29-1+deb11u1
  • oldstable: 0.10.45-1
  • stable: 0.10.72-1
  • testing: 0.10.73-1
  • unstable: 0.10.78-1
versioned links
  • 0.10.29-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.10.29-1+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.10.45-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.10.72-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.10.73-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.10.78-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • librust-openssl-dev
action needed
source package has 1 unsatisfiable build dependency high
  • Build dependencies in unstable cannot be satisfied on i386, s390x, ppc64el, amd64, armhf, and arm64 because: unsatisfied dependency on librust-openssl-sys-0.9+default-dev (>= 0.9.114) | librust-openssl-sys-0.9+default-dev (>= 0.9.114)
Created: 2026-04-26 Last update: 2026-04-28 20:32
Debci reports failed tests high
  • unstable: pass (log)
    The tests ran in 0:03:06
    Last run: 2026-04-21T16:34:33.000Z
    Previous status: unknown

  • testing: fail (log)
    The tests ran in 0:05:19
    Last run: 2026-04-21T12:26:39.000Z
    Previous status: unknown

  • stable: pass (log)
    The tests ran in 0:04:59
    Last run: 2025-11-09T00:59:31.000Z
    Previous status: unknown

Created: 2026-04-21 Last update: 2026-04-28 20:01
5 security issues in forky high

There are 5 open security issues in forky.

5 important issues:
  • CVE-2026-41676: rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.27 to before 0.10.78, Deriver::derive (and PkeyCtxRef::derive) sets len = buf.len() and passes it as the in/out length to EVP_PKEY_derive, relying on OpenSSL to honor it. On OpenSSL 1.1.x, X25519, X448, DH and HKDF-extract ignore the incoming *keylen, unconditionally writing the full shared secret (32/56/prime-size bytes). A caller passing a short slice gets a heap/stack overflow from safe code. OpenSSL 3.x providers do check, so this only impacts older OpenSSL. This vulnerability is fixed in 0.10.78.
  • CVE-2026-41677: rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.0 to before 0.10.78, the *_from_pem_callback APIs did not validate the length returned by the user's callback. A password callback that returns a value larger than the buffer it was given can cause some versions of OpenSSL to over-read this buffer. OpenSSL 3.x is not affected by this. This vulnerability is fixed in 0.10.78.
  • CVE-2026-41678: rust-openssl provides OpenSSL bindings for the Rust programming language. From to before 0.10.78, aes::unwrap_key() contains an incorrect assertion: it checks that out.len() + 8 <= in_.len(), but this condition is reversed. The intended invariant is out.len() >= in_.len() - 8, ensuring the output buffer is large enough. Because of the inverted check, the function only accepts buffers at or below the minimum required size and rejects larger ones. If a smaller buffer is provided the function will write past the end of out by in_.len() - 8 - out.len() bytes, causing an out-of-bounds write from a safe public function. This vulnerability is fixed in 0.10.78.
  • CVE-2026-41681: rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.10.39 to before 0.10.78, EVP_DigestFinal() always writes EVP_MD_CTX_size(ctx) to the out buffer. If out is smaller than that, MdCtxRef::digest_final() writes past its end, usually corrupting the stack. This is reachable from safe Rust. This vulnerability is fixed in 0.10.78.
  • CVE-2026-41898: rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.24 to before 0.10.78, the FFI trampolines behind SslContextBuilder::set_psk_client_callback, set_psk_server_callback, set_cookie_generate_cb, and set_stateless_cookie_generate_cb forwarded the user closure's returned usize directly to OpenSSL without checking it against the &mut [u8] that was handed to the closure. This can lead to buffer overflows and other unintended consequences. This vulnerability is fixed in 0.10.78.
Created: 2026-04-25 Last update: 2026-04-28 19:02
7 security issues in bullseye high

There are 7 open security issues in bullseye.

5 important issues:
  • CVE-2026-41676: rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.27 to before 0.10.78, Deriver::derive (and PkeyCtxRef::derive) sets len = buf.len() and passes it as the in/out length to EVP_PKEY_derive, relying on OpenSSL to honor it. On OpenSSL 1.1.x, X25519, X448, DH and HKDF-extract ignore the incoming *keylen, unconditionally writing the full shared secret (32/56/prime-size bytes). A caller passing a short slice gets a heap/stack overflow from safe code. OpenSSL 3.x providers do check, so this only impacts older OpenSSL. This vulnerability is fixed in 0.10.78.
  • CVE-2026-41677: rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.0 to before 0.10.78, the *_from_pem_callback APIs did not validate the length returned by the user's callback. A password callback that returns a value larger than the buffer it was given can cause some versions of OpenSSL to over-read this buffer. OpenSSL 3.x is not affected by this. This vulnerability is fixed in 0.10.78.
  • CVE-2026-41678: rust-openssl provides OpenSSL bindings for the Rust programming language. From to before 0.10.78, aes::unwrap_key() contains an incorrect assertion: it checks that out.len() + 8 <= in_.len(), but this condition is reversed. The intended invariant is out.len() >= in_.len() - 8, ensuring the output buffer is large enough. Because of the inverted check, the function only accepts buffers at or below the minimum required size and rejects larger ones. If a smaller buffer is provided the function will write past the end of out by in_.len() - 8 - out.len() bytes, causing an out-of-bounds write from a safe public function. This vulnerability is fixed in 0.10.78.
  • CVE-2026-41681: rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.10.39 to before 0.10.78, EVP_DigestFinal() always writes EVP_MD_CTX_size(ctx) to the out buffer. If out is smaller than that, MdCtxRef::digest_final() writes past its end, usually corrupting the stack. This is reachable from safe Rust. This vulnerability is fixed in 0.10.78.
  • CVE-2026-41898: rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.24 to before 0.10.78, the FFI trampolines behind SslContextBuilder::set_psk_client_callback, set_psk_server_callback, set_cookie_generate_cb, and set_stateless_cookie_generate_cb forwarded the user closure's returned usize directly to OpenSSL without checking it against the &mut [u8] that was handed to the closure. This can lead to buffer overflows and other unintended consequences. This vulnerability is fixed in 0.10.78.
2 issues postponed or untriaged:
  • CVE-2025-3416: (postponed; to be fixed through a stable update) A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.
  • CVE-2023-53159: (postponed; to be fixed through a stable update) The openssl crate before 0.10.55 for Rust allows an out-of-bounds read via an empty string to X509VerifyParamRef::set_host.
Created: 2026-04-25 Last update: 2026-04-28 19:02
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2026-04-25 Last update: 2026-04-25 21:32
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2026-04-26 Last update: 2026-04-26 07:00
14 open merge requests in Salsa normal
There are 14 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-08-19 Last update: 2026-04-25 21:32
5 low-priority security issues in trixie low

There are 5 open security issues in trixie.

5 issues left for the package maintainer to handle:
  • CVE-2026-41676: (needs triaging) rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.27 to before 0.10.78, Deriver::derive (and PkeyCtxRef::derive) sets len = buf.len() and passes it as the in/out length to EVP_PKEY_derive, relying on OpenSSL to honor it. On OpenSSL 1.1.x, X25519, X448, DH and HKDF-extract ignore the incoming *keylen, unconditionally writing the full shared secret (32/56/prime-size bytes). A caller passing a short slice gets a heap/stack overflow from safe code. OpenSSL 3.x providers do check, so this only impacts older OpenSSL. This vulnerability is fixed in 0.10.78.
  • CVE-2026-41677: (needs triaging) rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.0 to before 0.10.78, the *_from_pem_callback APIs did not validate the length returned by the user's callback. A password callback that returns a value larger than the buffer it was given can cause some versions of OpenSSL to over-read this buffer. OpenSSL 3.x is not affected by this. This vulnerability is fixed in 0.10.78.
  • CVE-2026-41678: (needs triaging) rust-openssl provides OpenSSL bindings for the Rust programming language. From to before 0.10.78, aes::unwrap_key() contains an incorrect assertion: it checks that out.len() + 8 <= in_.len(), but this condition is reversed. The intended invariant is out.len() >= in_.len() - 8, ensuring the output buffer is large enough. Because of the inverted check, the function only accepts buffers at or below the minimum required size and rejects larger ones. If a smaller buffer is provided the function will write past the end of out by in_.len() - 8 - out.len() bytes, causing an out-of-bounds write from a safe public function. This vulnerability is fixed in 0.10.78.
  • CVE-2026-41681: (needs triaging) rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.10.39 to before 0.10.78, EVP_DigestFinal() always writes EVP_MD_CTX_size(ctx) to the out buffer. If out is smaller than that, MdCtxRef::digest_final() writes past its end, usually corrupting the stack. This is reachable from safe Rust. This vulnerability is fixed in 0.10.78.
  • CVE-2026-41898: (needs triaging) rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.24 to before 0.10.78, the FFI trampolines behind SslContextBuilder::set_psk_client_callback, set_psk_server_callback, set_cookie_generate_cb, and set_stateless_cookie_generate_cb forwarded the user closure's returned usize directly to OpenSSL without checking it against the &mut [u8] that was handed to the closure. This can lead to buffer overflows and other unintended consequences. This vulnerability is fixed in 0.10.78.

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-04-25 Last update: 2026-04-28 19:02
8 low-priority security issues in bookworm low

There are 8 open security issues in bookworm.

8 issues left for the package maintainer to handle:
  • CVE-2025-3416: (needs triaging) A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.
  • CVE-2023-53159: (needs triaging) The openssl crate before 0.10.55 for Rust allows an out-of-bounds read via an empty string to X509VerifyParamRef::set_host.
  • CVE-2025-24898: (needs triaging) rust-openssl is a set of OpenSSL bindings for the Rust programming language. In affected versions `ssl::select_next_proto` can return a slice pointing into the `server` argument's buffer but with a lifetime bound to the `client` argument. In situations where the `sever` buffer's lifetime is shorter than the `client` buffer's, this can cause a use after free. This could cause the server to crash or to return arbitrary memory contents to the client. The crate`openssl` version 0.10.70 fixes the signature of `ssl::select_next_proto` to properly constrain the output buffer's lifetime to that of both input buffers. Users are advised to upgrade. In standard usage of `ssl::select_next_proto` in the callback passed to `SslContextBuilder::set_alpn_select_callback`, code is only affected if the `server` buffer is constructed *within* the callback.
  • CVE-2026-41676: (needs triaging) rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.27 to before 0.10.78, Deriver::derive (and PkeyCtxRef::derive) sets len = buf.len() and passes it as the in/out length to EVP_PKEY_derive, relying on OpenSSL to honor it. On OpenSSL 1.1.x, X25519, X448, DH and HKDF-extract ignore the incoming *keylen, unconditionally writing the full shared secret (32/56/prime-size bytes). A caller passing a short slice gets a heap/stack overflow from safe code. OpenSSL 3.x providers do check, so this only impacts older OpenSSL. This vulnerability is fixed in 0.10.78.
  • CVE-2026-41677: (needs triaging) rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.0 to before 0.10.78, the *_from_pem_callback APIs did not validate the length returned by the user's callback. A password callback that returns a value larger than the buffer it was given can cause some versions of OpenSSL to over-read this buffer. OpenSSL 3.x is not affected by this. This vulnerability is fixed in 0.10.78.
  • CVE-2026-41678: (needs triaging) rust-openssl provides OpenSSL bindings for the Rust programming language. From to before 0.10.78, aes::unwrap_key() contains an incorrect assertion: it checks that out.len() + 8 <= in_.len(), but this condition is reversed. The intended invariant is out.len() >= in_.len() - 8, ensuring the output buffer is large enough. Because of the inverted check, the function only accepts buffers at or below the minimum required size and rejects larger ones. If a smaller buffer is provided the function will write past the end of out by in_.len() - 8 - out.len() bytes, causing an out-of-bounds write from a safe public function. This vulnerability is fixed in 0.10.78.
  • CVE-2026-41681: (needs triaging) rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.10.39 to before 0.10.78, EVP_DigestFinal() always writes EVP_MD_CTX_size(ctx) to the out buffer. If out is smaller than that, MdCtxRef::digest_final() writes past its end, usually corrupting the stack. This is reachable from safe Rust. This vulnerability is fixed in 0.10.78.
  • CVE-2026-41898: (needs triaging) rust-openssl provides OpenSSL bindings for the Rust programming language. From 0.9.24 to before 0.10.78, the FFI trampolines behind SslContextBuilder::set_psk_client_callback, set_psk_server_callback, set_cookie_generate_cb, and set_stateless_cookie_generate_cb forwarded the user closure's returned usize directly to OpenSSL without checking it against the &mut [u8] that was handed to the closure. This can lead to buffer overflows and other unintended consequences. This vulnerability is fixed in 0.10.78.

You can find information about how to handle these issues in the security team's documentation.

Created: 2024-04-04 Last update: 2026-04-28 19:02
debian/patches: 3 patches to forward upstream low

Among the 3 debian patches available in version 0.10.78-1 of the package, we noticed the following issues:

  • 3 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-04-26 12:00
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.3).
Created: 2025-12-23 Last update: 2026-04-26 00:17
testing migrations
  • excuses:
    • Migration status for rust-openssl (0.10.73-1 to 0.10.78-1): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ rust-openssl unsatisfiable Build-Depends(-Arch) on amd64: librust-openssl-sys-0.9+default-dev (>= 0.9.114)
    • ∙ ∙ rust-openssl unsatisfiable Build-Depends(-Arch) on arm64: librust-openssl-sys-0.9+default-dev (>= 0.9.114)
    • ∙ ∙ rust-openssl unsatisfiable Build-Depends(-Arch) on armhf: librust-openssl-sys-0.9+default-dev (>= 0.9.114)
    • ∙ ∙ rust-openssl unsatisfiable Build-Depends(-Arch) on i386: librust-openssl-sys-0.9+default-dev (>= 0.9.114)
    • ∙ ∙ rust-openssl unsatisfiable Build-Depends(-Arch) on loong64: librust-openssl-sys-0.9+default-dev (>= 0.9.114)
    • ∙ ∙ rust-openssl unsatisfiable Build-Depends(-Arch) on ppc64el: librust-openssl-sys-0.9+default-dev (>= 0.9.114)
    • ∙ ∙ rust-openssl unsatisfiable Build-Depends(-Arch) on riscv64: librust-openssl-sys-0.9+default-dev (>= 0.9.114)
    • ∙ ∙ rust-openssl unsatisfiable Build-Depends(-Arch) on s390x: librust-openssl-sys-0.9+default-dev (>= 0.9.114)
    • ∙ ∙ Missing build on amd64
    • ∙ ∙ Missing build on arm64
    • ∙ ∙ Missing build on armhf
    • ∙ ∙ Missing build on i386
    • ∙ ∙ Missing build on loong64
    • ∙ ∙ Missing build on ppc64el
    • ∙ ∙ Missing build on riscv64
    • ∙ ∙ Missing build on s390x
    • ∙ ∙ Autopkgtest deferred: missing builds
    • ∙ ∙ Lintian check deferred: missing builds
    • ∙ ∙ Reproducibility check deferred on amd64: missing builds
    • ∙ ∙ Reproducibility check deferred on arm64: missing builds
    • ∙ ∙ Reproducibility check deferred on armhf: missing builds
    • ∙ ∙ Reproducibility check deferred on i386: missing builds
    • ∙ ∙ Reproducibility check deferred on ppc64el: missing builds
    • ∙ ∙ Too young, only 3 of 5 days old
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/r/rust-openssl.html
    • Not considered
news
[rss feed]
  • [2026-04-25] Accepted rust-openssl 0.10.78-1 (source) into unstable (Peter Michael Green)
  • [2025-08-30] rust-openssl 0.10.73-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-27] Accepted rust-openssl 0.10.73-1 (source) into unstable (Christopher Hoskin)
  • [2025-04-14] rust-openssl 0.10.72-1 MIGRATED to testing (Debian testing watch)
  • [2025-04-08] Accepted rust-openssl 0.10.72-1 (source) into unstable (Peter Michael Green)
  • [2025-02-12] rust-openssl 0.10.70-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-11] Accepted rust-openssl 0.10.29-1+deb11u1 (source) into oldstable-security (Andrej Shadura) (signed by: Andrew Shadura)
  • [2025-02-06] Accepted rust-openssl 0.10.70-1 (source) into unstable (Peter Michael Green)
  • [2024-12-29] rust-openssl 0.10.68-1 MIGRATED to testing (Debian testing watch)
  • [2024-12-27] Accepted rust-openssl 0.10.68-1 (source) into unstable (Peter Michael Green)
  • [2024-03-26] rust-openssl 0.10.64-1 MIGRATED to testing (Debian testing watch)
  • [2024-03-09] Accepted rust-openssl 0.10.64-1 (source) into unstable (Peter Michael Green)
  • [2023-09-12] rust-openssl 0.10.57-1 MIGRATED to testing (Debian testing watch)
  • [2023-09-07] Accepted rust-openssl 0.10.57-1 (source) into unstable (Peter Michael Green)
  • [2023-01-06] rust-openssl 0.10.45-1 MIGRATED to testing (Debian testing watch)
  • [2022-12-31] Accepted rust-openssl 0.10.45-1 (source) into unstable (Peter Michael Green)
  • [2022-09-28] Accepted rust-openssl 0.10.41-1 (source) into experimental (Fabian Grünbichler) (signed by: James McCoy)
  • [2021-12-26] rust-openssl 0.10.36-1 MIGRATED to testing (Debian testing watch)
  • [2021-10-23] Accepted rust-openssl 0.10.36-1 (source) into unstable (Ximin Luo) (signed by: infinity0@debian.org)
  • [2020-04-24] rust-openssl 0.10.29-1 MIGRATED to testing (Debian testing watch)
  • [2020-04-18] Accepted rust-openssl 0.10.29-1 (source) into unstable (Ximin Luo) (signed by: infinity0@debian.org)
  • [2020-03-16] rust-openssl REMOVED from testing (Debian testing watch)
  • [2019-07-09] rust-openssl 0.10.23-1 MIGRATED to testing (Debian testing watch)
  • [2019-05-31] Accepted rust-openssl 0.10.23-1 (source) into unstable (Ximin Luo)
  • [2019-01-01] rust-openssl 0.10.16-1 MIGRATED to testing (Debian testing watch)
  • [2018-12-26] Accepted rust-openssl 0.10.16-1 (source) into unstable (Ximin Luo)
  • [2018-12-19] rust-openssl 0.10.10-1 MIGRATED to testing (Debian testing watch)
  • [2018-08-03] Accepted rust-openssl 0.10.10-1 (amd64 source) into unstable, unstable (Ximin Luo)
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, reproducibility, debcheck, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.10.73-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing