From be5a1c9d279b8728f7ff8322eca2f6f2bce97fb6 Mon Sep 17 00:00:00 2001 From: Paul Kehrer Date: Fri, 24 Mar 2023 10:55:14 +0800 Subject: [PATCH] X509Extension::new and X509Extension::new_nid null ptr deref (#1658) --- crates/openssl/RUSTSEC-0000-0000.md | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 crates/openssl/RUSTSEC-0000-0000.md diff --git a/crates/openssl/RUSTSEC-0000-0000.md b/crates/openssl/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..17cee7a --- /dev/null +++ b/crates/openssl/RUSTSEC-0000-0000.md @@ -0,0 +1,20 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "openssl" +date = "2023-03-24" +url = "https://github.com/sfackler/rust-openssl/pull/1854" +categories = ["denial-of-service"] + +[affected] +functions = { "openssl::x509::X509Extension::new" = ["< 0.10.48, >=0.9.7"], "openssl::x509::X509Extension::new_nid" = ["< 0.10.48, >=0.9.7"] } + +[versions] +patched = [">= 0.10.48"] +``` + +# `openssl` `X509Extension::new` and `X509Extension::new_nid` null pointer dereference + +These functions would crash when the context argument was None with certain extension types. + +Thanks to David Benjamin (Google) for reporting this issue.