Out-of-bounds Write Affecting openssl package, versions [,3.0.20)[3.1.0,3.3.7)[3.4.0,3.4.5)[3.5.0,3.5.6)[3.6.0,3.6.2)


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Out-of-bounds Write vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CONAN-OPENSSL-15928861
  • published8 Apr 2026
  • disclosed7 Apr 2026
  • creditQuoc Tran

Introduced: 7 Apr 2026

NewCVE-2026-31789  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

Upgrade openssl to version 3.0.20, 3.3.7, 3.4.5, 3.5.6, 3.6.2 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Write via the hexadecimal conversion process of excessively large OCTET STRING values in X.509 certificate extensions such as Subject Key Identifier or Authority Key Identifier. An attacker can cause a crash, execute arbitrary code, or trigger other undefined behavior by supplying a crafted certificate with a very large OCTET STRING value, leading to a heap buffer overflow on 32-bit platforms when the contents are printed or logged.

Note:

This is only exploitable if the application or service processes untrusted X.509 certificates containing OCTET STRING values exceeding 1 Gigabyte on a 32-bit platform.

CVSS Base Scores

version 4.0
version 3.1