The *_from_pem_callback APIs did not validate the length returned by the user's callback. A password callback that returns a value larger than the buffer it was given can cause some versions of OpenSSL to over-read this buffer. OpenSSL 3.x is not affected by this.
{
"cwe_ids": [
"CWE-125",
"CWE-1284"
],
"nvd_published_at": "2026-04-24T18:16:29Z",
"severity": "LOW",
"github_reviewed_at": "2026-04-22T21:20:04Z",
"github_reviewed": true
}