Search for packages
| purl | pkg:pypi/pyopenssl@24.2.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-dt7c-fvqj-2bek
Aliases: CVE-2026-27448 GHSA-vp96-hxj8-p424 |
pyOpenSSL allows TLS connection bypass via unhandled callback exception in set_tlsext_servername_callback If a user provided callback to `set_tlsext_servername_callback` raised an unhandled exception, this would result in a connection being accepted. If a user was relying on this callback for any security-sensitive behavior, this could allow bypassing it. Unhandled exceptions now result in rejecting the connection. Credit to **Leury Castillo** for reporting this issue. |
Affected by 0 other vulnerabilities. |
|
VCID-mt1s-vhfk-5bda
Aliases: CVE-2026-27459 GHSA-5pwr-322w-8jr4 |
pyOpenSSL DTLS cookie callback buffer overflow If a user provided callback to `set_cookie_generate_callback` returned a cookie value greater than 256 bytes, pyOpenSSL would overflow an OpenSSL provided buffer. Cookie values that are too long are now rejected. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||