From 58acd2928dd4843bf91d4f6a8afaea03ed82942e Mon Sep 17 00:00:00 2001 From: Alex Gaynor Date: Fri, 4 Apr 2025 09:49:00 -0400 Subject: [PATCH] Added rustsec advisory for two UAFs in rust-openssl (#2270) --- crates/openssl/RUSTSEC-0000-0000.md | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 crates/openssl/RUSTSEC-0000-0000.md diff --git a/crates/openssl/RUSTSEC-0000-0000.md b/crates/openssl/RUSTSEC-0000-0000.md new file mode 100644 index 00000000..8fc89e17 --- /dev/null +++ b/crates/openssl/RUSTSEC-0000-0000.md @@ -0,0 +1,24 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "openssl" +date = "2025-04-04" +url = "https://github.com/sfackler/rust-openssl/pull/2390" +categories = ["memory-corruption"] + +[versions] +patched = [">= 0.10.72"] +unaffected = ["< 0.10.39"] + +[affected.functions] +"openssl::md::Md::fetch" = [">= 0.10.39, < 0.10.72"] +"openssl::cipher::Cipher::fetch" = [">= 0.10.39, < 0.10.72"] +``` + +# Use-After-Free in `Md::fetch` and `Cipher::fetch` + +When a `Some(...)` value was passed to the `properties` argument of either of these functions, a use-after-free would result. + +In practice this would nearly always result in OpenSSL treating the properties as an empty string (due to `CString::drop`'s behavior). + +The maintainers thank [quitbug](https://github.com/quitbug/) for reporting this vulnerability to us.