A memory corruption flaw was found in the way the openssl_x509_parse() function of the PHP openssl extension parsed X.509 certificates. A remote attacker could use this flaw to provide a malicious certificate, which may cause the application to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the user running the PHP interpreter.
Airlock is not affected because PHP is not used in Airlock.
Airlock protects back-ends by terminating SSL/TLS and never uses untrusted client certificates to establish SSL/TLS sessions with back-ends.