{"id":"GHSA-8qv2-5vq6-g2g7","summary":"webpki: CPU denial of service in certificate path building","details":"When this crate is given a pathological certificate chain to validate, it will spend CPU time exponential with the number of candidate certificates at each step of path building.\n\nBoth TLS clients and TLS servers that accept client certificate are affected.\n\nThis was previously reported in https://github.com/briansmith/webpki/issues/69.\n\n`rustls-webpki` is a fork of this crate which contains a fix for this issue and is actively maintained.","aliases":["RUSTSEC-2023-0052"],"modified":"2026-02-04T03:28:59.012178Z","published":"2023-08-25T00:12:39Z","related":["CGA-gqmf-x36g-q2rw"],"database_specific":{"cwe_ids":["CWE-400"],"severity":"HIGH","nvd_published_at":null,"github_reviewed":true,"github_reviewed_at":"2023-08-25T00:12:39Z"},"references":[{"type":"WEB","url":"https://github.com/briansmith/webpki/issues/69"},{"type":"WEB","url":"https://github.com/briansmith/webpki/issues/69#issuecomment-1699894848"},{"type":"WEB","url":"https://github.com/briansmith/webpki/commit/30a108e0802fd09585e0d071013f24b8272d139b"},{"type":"PACKAGE","url":"https://github.com/briansmith/webpki"},{"type":"WEB","url":"https://github.com/crypto-com/sgx-vendor"},{"type":"WEB","url":"https://rustsec.org/advisories/RUSTSEC-2023-0052.html"}],"affected":[{"package":{"name":"webpki","ecosystem":"crates.io","purl":"pkg:cargo/webpki"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.22.2"}]}],"database_specific":{"last_known_affected_version_range":"\u003c= 0.22.1","source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/08/GHSA-8qv2-5vq6-g2g7/GHSA-8qv2-5vq6-g2g7.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}