Debian Patches

Status for rust-openssl/0.10.29-1+deb11u1

Patch Description Author Forwarded Bugs Origin Last update
disable-vendor.patch disable-vendor Debian Rust Maintainers <pkg-rust-maintainers@alioth-lists.debian.net> no 2025-02-10
CVE-2025-24898.patch Fix lifetimes in ssl::select_next_proto
SSL_select_next_proto can return a pointer into either the client or
server buffers, but the type signature of the function previously only
bound the output buffer to the client buffer. This can result in a UAF
in situations where the server slice does not point to a long-lived
allocation.

ssl::select_next_proto can return a slice pointing into the server
argument's buffer but with a lifetime bound to the client argument. In
situations where the server buffer's lifetime is shorter than the client
buffer's, this can cause a use after free. This could cause the server
to crash or to return arbitrary memory contents to the client.

Thanks to Matt Mastracci for reporting this issue.

(cherry picked from commit 8e6e30bbf7e7627845b801f83a3810d6ffc1f157)
Steven Fackler <sfackler@gmail.com> no 2025-02-02

All known versions for source package 'rust-openssl'

Links