RustSec logo

HistoryEditJSON (OSV)

RUSTSEC-2026-0042

CRL Distribution Point Scope Check Logic Error in AWS-LC

Reported
Issued
Package
aws-lc-fips-sys (crates.io)
Type
Vulnerability
Categories
Keywords
#crl #revocation #bypass
Aliases
References
CVSS Score
7.4 HIGH
CVSS Details
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality Impact
High
Integrity Impact
High
Availability Impact
None
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Patched
  • >=0.13.13
Unaffected
  • <0.13.0

Description

A logic error in CRL distribution point matching in AWS-LC allows a revoked certificate to bypass revocation checks during certificate validation, when the application enables CRL checking and uses partitioned CRLs with Issuing Distribution Point (IDP) extensions.

Customers of AWS services do not need to take action. aws-lc-fips-sys contains code from AWS-LC. Applications using aws-lc-fips-sys should upgrade to the most recent release of aws-lc-fips-sys.

Workarounds

Applications can workaround this issue if they do not enable CRL checking (X509_V_FLAG_CRL_CHECK). Applications using complete (non-partitioned) CRLs without IDP extensions are also not affected.

Otherwise, there is no workaround and applications using aws-lc-fips-sys should upgrade to the most recent releases of aws-lc-fips-sys.

Advisory available under CC0-1.0 license.