Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2024-32650

Published: 19 April 2024

Rustls is a modern TLS library written in Rust. `rustls::ConnectionCommon::complete_io` could fall into an infinite loop based on network input. When using a blocking rustls server, if a client send a `close_notify` message immediately after `client_hello`, the server's `complete_io` will get in an infinite loop. This vulnerability is fixed in 0.23.5, 0.22.4, and 0.21.11.

Priority

Medium

Status

Package Release Status
rust-rustls
Launchpad, Ubuntu, Debian
focal Does not exist

jammy Does not exist

mantic Needs triage

noble Needs triage

upstream Needs triage

Patches:
upstream: https://github.com/rustls/rustls/commit/2123576840aa31043a31b0770e6572136fbe0c2d
upstream: https://github.com/rustls/rustls/commit/6e938bcfe82a9da7a2e1cbf10b928c7eca26426e
upstream: https://github.com/rustls/rustls/commit/f45664fbded03d833dffd806503d3c8becd1b71e
rust-rustls-0.20
Launchpad, Ubuntu, Debian
focal Does not exist

jammy Does not exist

mantic Needs triage

noble Does not exist

upstream Needs triage