Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RUSTSEC-2023-0052: webpki: CPU denial of service in certificate path building #1285

Closed
github-actions bot opened this issue Aug 23, 2023 · 1 comment
Closed
Labels
invalid rejected as a valid issue security related to advisories or CVEs

Comments

@github-actions
Copy link
Contributor

webpki: CPU denial of service in certificate path building

Details
Package webpki
Version 0.22.0
Date 2023-08-22

When this crate is given a pathological certificate chain to validate, it will
spend CPU time exponential with the number of candidate certificates at each
step of path building.

Both TLS clients and TLS servers that accept client certificate are affected.

This was previously reported in
<briansmith/webpki#69> and re-reported recently
by Luke Malinowski.

rustls-webpki is a fork of this crate which contains a fix for this issue
and is actively maintained.

See advisory page for additional details.

@clux
Copy link
Member

clux commented Aug 23, 2023

We only have rustls-webpki in our dependency tree.

$ cargo tree --all-features |grep webpki
│   │   │   ├── rustls-webpki v0.101.3

@clux clux closed this as completed Aug 23, 2023
@clux clux added invalid rejected as a valid issue security related to advisories or CVEs labels Aug 23, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
invalid rejected as a valid issue security related to advisories or CVEs
Projects
None yet
Development

No branches or pull requests

1 participant