-
-
Notifications
You must be signed in to change notification settings - Fork 752
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Segfault with empty String
domain
#1965
Comments
DaanA32
added a commit
to DaanA32/rust-openssl
that referenced
this issue
Jun 19, 2023
This was referenced Jun 21, 2023
Closed
jiangliu
added a commit
to jiangliu/image-service
that referenced
this issue
Jun 21, 2023
error[vulnerability]: `openssl` `X509VerifyParamRef::set_host` buffer over-read ┌─ /github/workspace/Cargo.lock:122:1 │ 122 │ openssl 0.10.48 registry+https://github.com/rust-lang/crates.io-index │ --------------------------------------------------------------------- security vulnerability detected │ = ID: RUSTSEC-2023-0044 = Advisory: https://rustsec.org/advisories/RUSTSEC-2023-0044 = When this function was passed an empty string, `openssl` would attempt to call `strlen` on it, reading arbitrary memory until it reached a NUL byte. = Announcement: sfackler/rust-openssl#1965 = Solution: Upgrade to >=0.10.55 Signed-off-by: Jiang Liu <[email protected]>
imeoer
pushed a commit
to dragonflyoss/nydus
that referenced
this issue
Jun 21, 2023
error[vulnerability]: `openssl` `X509VerifyParamRef::set_host` buffer over-read ┌─ /github/workspace/Cargo.lock:122:1 │ 122 │ openssl 0.10.48 registry+https://github.com/rust-lang/crates.io-index │ --------------------------------------------------------------------- security vulnerability detected │ = ID: RUSTSEC-2023-0044 = Advisory: https://rustsec.org/advisories/RUSTSEC-2023-0044 = When this function was passed an empty string, `openssl` would attempt to call `strlen` on it, reading arbitrary memory until it reached a NUL byte. = Announcement: sfackler/rust-openssl#1965 = Solution: Upgrade to >=0.10.55 Signed-off-by: Jiang Liu <[email protected]>
Michael-F-Bryan
pushed a commit
to wasmerio/wasmer
that referenced
this issue
Jun 21, 2023
Michael-F-Bryan
pushed a commit
to wasmerio/wasmer
that referenced
this issue
Jun 21, 2023
Michael-F-Bryan
pushed a commit
to wasmerio/wasmer
that referenced
this issue
Jun 21, 2023
Michael-F-Bryan
pushed a commit
to wasmerio/wasmer
that referenced
this issue
Jun 21, 2023
Michael-F-Bryan
pushed a commit
to wasmerio/wasmer
that referenced
this issue
Jun 21, 2023
ccx1024cc
pushed a commit
to ccx1024cc/image-service
that referenced
this issue
Jul 11, 2023
openssl` `X509VerifyParamRef::set_host` buffer over-read from openssl 0.10.48 registry+https://github.com/rust-lang/crates.io-index ID: RUSTSEC-2023-0044 Advisory: https://rustsec.org/advisories/RUSTSEC-2023-0044 When this function was passed an empty string, `openssl` would attempt to call `strlen` on it, reading arbitrary memory until it reached a NUL byte. Announcement: sfackler/rust-openssl#1965 Solution: Upgrade to >=0.10.55 Signed-off-by: 泰友 <[email protected]>
ccx1024cc
pushed a commit
to ccx1024cc/image-service
that referenced
this issue
Jul 11, 2023
error[vulnerability]: `openssl` `X509VerifyParamRef::set_host` buffer over-read ┌─ /github/workspace/Cargo.lock:122:1 │ 122 │ openssl 0.10.48 registry+https://github.com/rust-lang/crates.io-index │ --------------------------------------------------------------------- security vulnerability detected │ = ID: RUSTSEC-2023-0044 = Advisory: https://rustsec.org/advisories/RUSTSEC-2023-0044 = When this function was passed an empty string, `openssl` would attempt to call `strlen` on it, reading arbitrary memory until it reached a NUL byte. = Announcement: sfackler/rust-openssl#1965 = Solution: Upgrade to >=0.10.55 Signed-off-by: Jiang Liu <[email protected]>
imeoer
pushed a commit
to dragonflyoss/nydus
that referenced
this issue
Jul 11, 2023
error[vulnerability]: `openssl` `X509VerifyParamRef::set_host` buffer over-read ┌─ /github/workspace/Cargo.lock:122:1 │ 122 │ openssl 0.10.48 registry+https://github.com/rust-lang/crates.io-index │ --------------------------------------------------------------------- security vulnerability detected │ = ID: RUSTSEC-2023-0044 = Advisory: https://rustsec.org/advisories/RUSTSEC-2023-0044 = When this function was passed an empty string, `openssl` would attempt to call `strlen` on it, reading arbitrary memory until it reached a NUL byte. = Announcement: sfackler/rust-openssl#1965 = Solution: Upgrade to >=0.10.55 Signed-off-by: Jiang Liu <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
A segfault occurs in the following (code adapted from example/google-connect.rs):
It does work when the
String
is not empty.Output:
Valgrind log
The segfault occurs from:
rust-openssl/openssl/src/ssl/connector.rs
Line 400 in 8e16a8b
rust-openssl/openssl/src/x509/verify.rs
Line 121 in 8e16a8b
Solutions:
set_host
function to use CString by either changing function signature or converting to an error and handling it:The text was updated successfully, but these errors were encountered: