|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2024-32650: warp: rust-rustls: Infinite loop in rustls::conn::ConnectionCommon:complete_io() with proper client input | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Carlos López <carlos.lopez> |
| Component: | Incidents | Assignee: | Atri Bhattacharya <badshah400> |
| Status: | NEW --- | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | carlos.lopez |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/402742/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2024-32650:7.5:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | ||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Bug Depends on: | |||
| Bug Blocks: | 1223211 | ||
|
Description
Carlos López
2024-04-22 11:41:36 UTC
Response from upstream developer: Thanks for bringing this to my attention. After reviewing the CVE closely and studying the involved components I come to the following conclusion: This CVE is only applicable for servers running rustls, not clients. The async-tungstenite crate does not use rustls as a server but merely as a client. Therefore I consider this CVE as not applicable to warp or magic-wormhole-rs. Of course I will still work with upstream to update and/or remove the rustls dependency (It is not actually used at all in most scenarios), but I do not consider it CVE-critical at this point. |