Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update: rust-openssl #1641

Open
dongsupark opened this issue Feb 10, 2025 · 0 comments
Open

update: rust-openssl #1641

dongsupark opened this issue Feb 10, 2025 · 0 comments
Labels
advisory security advisory security security concerns

Comments

@dongsupark
Copy link
Member

Name: rust-openssl
CVEs: CVE-2025-0977
CVSSs: n/a
Action Needed: update to >= 0.10.70

Summary: In openssl versions before 0.10.70, ssl::select_next_proto can return a slice pointing into the server argument's buffer but with a lifetime bound to the client argument. In situations where the server buffer's lifetime is shorter than the client buffer's, this can cause a use after free. This could cause the server to crash or to return arbitrary memory contents to the client. openssl 0.10.70 fixes the signature of ssl::select_next_proto to properly constrain the output buffer's lifetime to that of both input buffers. In standard usage of ssl::select_next_proto in the callback passed to SslContextBuilder::set_alpn_select_callback, code is only affected if the server buffer is constructed within the callback.

See also https://rustsec.org/advisories/RUSTSEC-2025-0004.html.

The only use case in Flatcar, ue-rs, already fixed the issue.
Still need to pull in the changes in flatcar/scripts.

refmap.gentoo: TBD

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
advisory security advisory security security concerns
Projects
Status: ⚒️ In Progress
Development

No branches or pull requests

1 participant