From e8534eadc5bd9d639e7a29ab90296f6532e5f4d9 Mon Sep 17 00:00:00 2001 From: Alex Gaynor Date: Tue, 20 Jun 2023 16:32:25 -0500 Subject: [PATCH] Report buffer-overread in OpenSSL (#1719) * Report buffer-overread in OpenSSL * Rename RUSTSEC-0000-0000 to RUSTSEC-0000-0000.md --- crates/openssl/RUSTSEC-0000-0000.md | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 crates/openssl/RUSTSEC-0000-0000.md diff --git a/crates/openssl/RUSTSEC-0000-0000.md b/crates/openssl/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..99a29e2 --- /dev/null +++ b/crates/openssl/RUSTSEC-0000-0000.md @@ -0,0 +1,18 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "openssl" +date = "2023-06-20" +url = "https://github.com/sfackler/rust-openssl/issues/1965" +categories = ["memory-exposure"] + +[affected] +functions = { "openssl::x509::verify::X509VerifyParamRef::set_host" = ["< 0.10.55, >=0.10.0"] } + +[versions] +patched = [">= 0.10.55"] +``` + +# `openssl` `X509VerifyParamRef::set_host` buffer over-read + +When this function was passed an empty string, `openssl` would attempt to call `strlen` on it, reading arbitrary memory until it reached a NUL byte.