Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-pj34-fpw3-83qj: bottlerocket dependency openssl is vulnerable to read buffer overflow via X.509 verification

A read buffer overflow can be triggered in OpenSSL X.509 verification during name constraint checking. Note that this occurs after the certificate chain has been verified and would require a compromised CA. This can cause a client or agent compiled with OpenSSL to crash unexpectedly. OpenSSL has been removed in bottlerocket/update-operator version 1.1.0 in favor of Rust-based TLS using rustls.

ghsa
#vulnerability#git#buffer_overflow#ssl

Skip to content

    • Actions

      Automate any workflow

    • Packages

      Host and manage packages

    • Security

      Find and fix vulnerabilities

    • Codespaces

      Instant dev environments

    • Copilot

      Write better code with AI

    • Code review

      Manage code changes

    • Issues

      Plan and track work

    • Discussions

      Collaborate outside of code

*   Explore
*   All features
*   Documentation
*   GitHub Skills
*   Blog
    • For

    • Enterprise

    • Teams

    • Startups

    • Education

    • By Solution

    • CI/CD & Automation

    • DevOps

    • DevSecOps

    • Case Studies

    • Customer Stories

    • Resources

    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
    

*   Repositories
*   Topics
*   Trending
*   Collections
  • Pricing
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-pj34-fpw3-83qj

bottlerocket dependency openssl is vulnerable to read buffer overflow via X.509 verification

Package

cargo bottlerocket/update-operator (Rust)

Affected versions

< 1.1.0

Description

Published to the GitHub Advisory Database

Feb 9, 2023

GHSA ID

GHSA-pj34-fpw3-83qj

Source code

ghsa: Latest News

GHSA-g5x8-v2ch-gj2g: Vaultwarden HTML injection vulnerability