GHSA-5pwr-322w-8jr4

Suggest an improvement
Source
https://github.com/advisories/GHSA-5pwr-322w-8jr4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-5pwr-322w-8jr4/GHSA-5pwr-322w-8jr4.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-5pwr-322w-8jr4
Aliases
  • CVE-2026-27459
Downstream
Related
Published
2026-03-16T16:22:29Z
Modified
2026-03-19T18:32:22.595629Z
Severity
  • 7.2 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
pyOpenSSL DTLS cookie callback buffer overflow
Details

If a user provided callback to set_cookie_generate_callback returned a cookie value greater than 256 bytes, pyOpenSSL would overflow an OpenSSL provided buffer.

Cookie values that are too long are now rejected.

Database specific
{
    "github_reviewed_at": "2026-03-16T16:22:29Z",
    "severity": "HIGH",
    "cwe_ids": [
        "CWE-120"
    ],
    "github_reviewed": true,
    "nvd_published_at": "2026-03-18T00:16:19Z"
}
References

Affected packages

PyPI / pyopenssl

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
22.0.0
Fixed
26.0.0

Affected versions

22.*
22.0.0
22.1.0
23.*
23.0.0
23.1.0
23.1.1
23.2.0
23.3.0
24.*
24.0.0
24.1.0
24.2.1
24.3.0
25.*
25.0.0
25.1.0
25.2.0
25.3.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-5pwr-322w-8jr4/GHSA-5pwr-322w-8jr4.json"