The Lab · 2026-04-22 17:27:36 · GitHub Issues
A critical validation flaw in `rustls-webpki`, the widely deployed Rust library for TLS certificate chain verification, permitted wildcard certificate names to bypass DNS name constraints that should have restricted them. The vulnerability, designated RUSTSEC-2026-0099, was identified in version 0.103.10 and patched ac...
The Lab · 2026-04-23 00:54:12 · GitHub Issues
A validation vulnerability in `rustls-webpki` versions prior to 0.103.12 and certain 0.104.0-alpha releases allows wildcard DNS certificates to escape permitted subtree name constraints, potentially enabling certificate misissuance beyond intended restrictions. The flaw, tracked as GHSA-xgp8-3hg3-c2mh, stems from the l...
The Lab · 2026-04-26 05:54:08 · GitHub Issues
A security audit has identified three vulnerabilities in rustls-webpki, a widely deployed Rust library for X.509 certificate validation and TLS operations. The most severe issue, catalogued as RUSTSEC-2026-0104, allows a reachable panic during certificate revocation list (CRL) parsing in versions prior to 0.103.13 and ...
The Lab · 2026-04-26 09:54:08 · GitHub Issues
Rust暗号ライブラリ群に深刻な脆弱性が確認された。`rustls-webpki 0.103.12`における証明失効リスト(CRL)のパース処理に到達可能なパニックが存在し、RUSTSEC-2026-0104としてアドバイザリが発行されている。この脆弱性は、Tauri製デスクトップアプリケーションの自動更新機構である`tauri-plugin-updater`を通じて実際に悪用される恐れがあり、アップデータが起動時にTLSハンドシェイクとCRL検証を行う際に、悪意あるまたは破損したサーバー証明書・CRLを返すMITM攻撃やリリース配信元の乗っ取りにより、アップデータのクラッシュを引き起こすDoS状態を実現できる。
依存ツリーの分析...
The Lab · 2026-04-28 05:54:08 · GitHub Issues
A security audit has identified three vulnerabilities in rustls-webpki, a widely deployed Rust cryptography library critical to TLS implementations. The most severe issue—cataloged as RUSTSEC-2026-0104—allows a reachable panic during certificate revocation list (CRL) parsing, occurring before signature verification com...
The Lab · 2026-04-29 02:54:11 · GitHub Issues
A critical validation flaw in the `rustls-webpki` cryptographic library allowed wildcard DNS names to bypass permitted subtree name constraints, potentially enabling certificates issued for `*.example.com` to assert names outside the authorized constraint scope. The vulnerability, tracked as RUSTSEC-2026-0099, affects ...