Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-27459

Опубликовано: 18 мар. 2026
Источник: debian
EPSS Низкий

Описание

pyOpenSSL is a Python wrapper around the OpenSSL library. Starting in version 22.0.0 and prior to version 26.0.0, if a user provided callback to `set_cookie_generate_callback` returned a cookie value greater than 256 bytes, pyOpenSSL would overflow an OpenSSL provided buffer. Starting in version 26.0.0, cookie values that are too long are now rejected.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pyopensslunfixedpackage
pyopensslno-dsatrixiepackage
pyopensslno-dsabookwormpackage

Примечания

  • https://github.com/pyca/pyopenssl/security/advisories/GHSA-5pwr-322w-8jr4

  • https://github.com/pyca/pyopenssl/commit/57f09bb4bb051d3bc2a1abd36e9525313d5cd408 (26.0.0)

EPSS

Процентиль: 5%
0.0002
Низкий

Связанные уязвимости

ubuntu
9 дней назад

(pyOpenSSL is a Python wrapper around the OpenSSL library. Starting in ...)

CVSS3: 8.1
redhat
9 дней назад

A flaw was found in pyOpenSSL. The set_cookie_generate_callback callback function can be used to generate DTLS cookies. When the callback returns a cookie string or byte sequence longer than 256 bytes, a buffer overflow can be triggered due to a missing bounds checking before copying the data to a fixed-size buffer provided by the underlying OpenSSL library.

nvd
9 дней назад

pyOpenSSL is a Python wrapper around the OpenSSL library. Starting in version 22.0.0 and prior to version 26.0.0, if a user provided callback to `set_cookie_generate_callback` returned a cookie value greater than 256 bytes, pyOpenSSL would overflow an OpenSSL provided buffer. Starting in version 26.0.0, cookie values that are too long are now rejected.

msrc
8 дней назад

pyOpenSSL DTLS cookie callback buffer overflow

github
10 дней назад

pyOpenSSL DTLS cookie callback buffer overflow

EPSS

Процентиль: 5%
0.0002
Низкий