Headline
GHSA-pj34-fpw3-83qj: bottlerocket dependency openssl is vulnerable to read buffer overflow via X.509 verification
A read buffer overflow can be triggered in OpenSSL X.509 verification during name constraint checking. Note that this occurs after the certificate chain has been verified and would require a compromised CA. This can cause a client or agent compiled with OpenSSL to crash unexpectedly. OpenSSL has been removed in bottlerocket/update-operator version 1.1.0 in favor of Rust-based TLS using rustls.
Skip to content
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
* Explore
* All features
* Documentation
* GitHub Skills
* Blog
For
Enterprise
Teams
Startups
Education
By Solution
CI/CD & Automation
DevOps
DevSecOps
Case Studies
Customer Stories
Resources
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
* Repositories
* Topics
* Trending
* Collections
- Pricing
- GitHub Advisory Database
- GitHub Reviewed
- GHSA-pj34-fpw3-83qj
bottlerocket dependency openssl is vulnerable to read buffer overflow via X.509 verification
Package
cargo bottlerocket/update-operator (Rust)
Affected versions
< 1.1.0
Description
Published to the GitHub Advisory Database
Feb 9, 2023
GHSA ID
GHSA-pj34-fpw3-83qj
Source code