Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1wajM0LWZwdzMtODNxas4AAxgg
bottlerocket dependency openssl is vulnerable to read buffer overflow via X.509 verification
A read buffer overflow can be triggered in OpenSSL X.509 verification during name constraint checking. Note that this occurs after the certificate chain has been verified and would require a compromised CA. This can cause a client or agent compiled with OpenSSL to crash unexpectedly. OpenSSL has been removed in bottlerocket/update-operator version 1.1.0 in favor of Rust-based TLS using rustls.
Permalink: https://github.com/advisories/GHSA-pj34-fpw3-83qjJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wajM0LWZwdzMtODNxas4AAxgg
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 8 months ago
Identifiers: GHSA-pj34-fpw3-83qj
References:
- https://github.com/bottlerocket-os/bottlerocket-update-operator/security/advisories/GHSA-pj34-fpw3-83qj
- https://github.com/bottlerocket-os/bottlerocket-update-operator/releases/tag/v1.1.0
- https://www.openssl.org/news/secadv/20230207.txt
- https://github.com/advisories/GHSA-pj34-fpw3-83qj
Blast Radius: 1.0
Affected Packages
cargo:bottlerocket/update-operator
Affected Version Ranges: < 1.1.0Fixed in: 1.1.0