rustls-webpki: CPU denial of service in certificate path building
High severity
GitHub Reviewed
Published
Aug 22, 2023
to the GitHub Advisory Database
•
Updated Sep 19, 2023
Package
Affected versions
< 0.100.2
>= 0.101.0, < 0.101.4
Patched versions
0.100.2
0.101.4
Description
Published to the GitHub Advisory Database
Aug 22, 2023
Reviewed
Aug 22, 2023
Last updated
Sep 19, 2023
When this crate is given a pathological certificate chain to validate, it will spend CPU time exponential with the number of candidate certificates at each step of path building.
Both TLS clients and TLS servers that accept client certificate are affected.
We now give each path building operation a budget of 100 signature verifications.
The original
webpki
crate is also affected, see GHSA-8qv2-5vq6-g2g7.This was previously reported in the original crate briansmith/webpki#69 and re-reported to us recently.
References