CVE-2023-53159

The openssl crate before 0.10.55 for Rust allows an out-of-bounds read via an empty string to X509VerifyParamRef::set_host.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sfackler:openssl:*:*:*:*:*:rust:*:*

History

07 Aug 2025, 15:30

Type Values Removed Values Added
First Time Sfackler openssl
Sfackler
References () https://crates.io/crates/openssl - () https://crates.io/crates/openssl - Product
References () https://github.com/sfackler/rust-openssl/issues/1965 - () https://github.com/sfackler/rust-openssl/issues/1965 - Exploit, Patch
References () https://rustsec.org/advisories/RUSTSEC-2023-0044.html - () https://rustsec.org/advisories/RUSTSEC-2023-0044.html - Third Party Advisory
CPE cpe:2.3:a:sfackler:openssl:*:*:*:*:*:rust:*:*

29 Jul 2025, 14:14

Type Values Removed Values Added
Summary
  • (es) El paquete openssl para Rust anterior a 0.10.55 permite una lectura fuera de los límites a través de una cadena vacía a X509VerifyParamRef::set_host.

28 Jul 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-28 03:15

Updated : 2025-08-07 15:30


NVD link : CVE-2023-53159

Mitre link : CVE-2023-53159

CVE.ORG link : CVE-2023-53159


JSON object : View

Products Affected

sfackler

  • openssl
CWE
CWE-126

Buffer Over-read