WhisperX tag archive

#rustls-webpki

This page collects WhisperX intelligence signals tagged #rustls-webpki. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (6)

The Lab · 2026-04-22 17:27:36 · GitHub Issues

1. RUSTSEC-2026-0099: rustls-webpki Flaw Allowed Wildcard Certificates to Bypass DNS Name Constraints

A critical validation flaw in `rustls-webpki`, the widely deployed Rust library for TLS certificate chain verification, permitted wildcard certificate names to bypass DNS name constraints that should have restricted them. The vulnerability, designated RUSTSEC-2026-0099, was identified in version 0.103.10 and patched ac...

The Lab · 2026-04-23 00:54:12 · GitHub Issues

2. rustls-webpki Wildcard Certificate Validation Flaw Bypasses Name Constraints in Security Patch Gap

A validation vulnerability in `rustls-webpki` versions prior to 0.103.12 and certain 0.104.0-alpha releases allows wildcard DNS certificates to escape permitted subtree name constraints, potentially enabling certificate misissuance beyond intended restrictions. The flaw, tracked as GHSA-xgp8-3hg3-c2mh, stems from the l...

The Lab · 2026-04-26 05:54:08 · GitHub Issues

3. Critical Panic Vulnerability Disclosed in rustls-webpki Certificate Revocation List Parsing

A security audit has identified three vulnerabilities in rustls-webpki, a widely deployed Rust library for X.509 certificate validation and TLS operations. The most severe issue, catalogued as RUSTSEC-2026-0104, allows a reachable panic during certificate revocation list (CRL) parsing in versions prior to 0.103.13 and ...

The Lab · 2026-04-26 09:54:08 · GitHub Issues

4. rustls-webpki 0.103.12 にCRLパース時の到達可能パニック -- tauri-plugin-updater経路でDoS脆弱性(RUSTSEC-2026-0104)

Rust暗号ライブラリ群に深刻な脆弱性が確認された。`rustls-webpki 0.103.12`における証明失効リスト(CRL)のパース処理に到達可能なパニックが存在し、RUSTSEC-2026-0104としてアドバイザリが発行されている。この脆弱性は、Tauri製デスクトップアプリケーションの自動更新機構である`tauri-plugin-updater`を通じて実際に悪用される恐れがあり、アップデータが起動時にTLSハンドシェイクとCRL検証を行う際に、悪意あるまたは破損したサーバー証明書・CRLを返すMITM攻撃やリリース配信元の乗っ取りにより、アップデータのクラッシュを引き起こすDoS状態を実現できる。 依存ツリーの分析...

The Lab · 2026-04-28 05:54:08 · GitHub Issues

5. Critical Vulnerabilities Discovered in rustls-webpki Cryptography Library: Panic and URI Validation Flaws Exposed

A security audit has identified three vulnerabilities in rustls-webpki, a widely deployed Rust cryptography library critical to TLS implementations. The most severe issue—cataloged as RUSTSEC-2026-0104—allows a reachable panic during certificate revocation list (CRL) parsing, occurring before signature verification com...

The Lab · 2026-04-29 02:54:11 · GitHub Issues

6. rustls-webpki Name Constraint Bypass Exposes Wildcard Certificates to DNS Restriction Evasion

A critical validation flaw in the `rustls-webpki` cryptographic library allowed wildcard DNS names to bypass permitted subtree name constraints, potentially enabling certificates issued for `*.example.com` to assert names outside the authorized constraint scope. The vulnerability, tracked as RUSTSEC-2026-0099, affects ...