Debian Patches
Status for rust-openssl/0.10.29-1+deb11u1
Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
disable-vendor.patch | disable-vendor | Debian Rust Maintainers <pkg-rust-maintainers@alioth-lists.debian.net> | no | 2025-02-10 | ||
CVE-2025-24898.patch | Fix lifetimes in ssl::select_next_proto SSL_select_next_proto can return a pointer into either the client or server buffers, but the type signature of the function previously only bound the output buffer to the client buffer. This can result in a UAF in situations where the server slice does not point to a long-lived allocation. ssl::select_next_proto can return a slice pointing into the server argument's buffer but with a lifetime bound to the client argument. In situations where the server buffer's lifetime is shorter than the client buffer's, this can cause a use after free. This could cause the server to crash or to return arbitrary memory contents to the client. Thanks to Matt Mastracci for reporting this issue. (cherry picked from commit 8e6e30bbf7e7627845b801f83a3810d6ffc1f157) |
Steven Fackler <sfackler@gmail.com> | no | 2025-02-02 |
All known versions for source package 'rust-openssl'
- 0.10.70-1 (sid, trixie)
- 0.10.45-1 (bookworm)
- 0.10.29-1+deb11u1 (bullseye-security)
- 0.10.29-1 (bullseye)