GHSA-qg5g-gv98-5ffh:
rustls network-reachable panic in `Acceptor::accept`
N/A
CVSS Score
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
-
Published
11/25/2024
Updated
11/25/2024
KEV Status
No
Technology
Rust
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
rustls | rust | >= 0.23.13, < 0.23.18 | 0.23.18 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper handling of fragmented ClientHello messages in the handshake processing pipeline. The call chain starts with Acceptor::accept
(user-facing API), progresses through handshake message coalescing in HandshakeDeframer
, and fails in buffer management via Coalescer::copy_within
. The stack trace shows these functions are directly involved in the panic condition when processing fragmented inputs. The vulnerability specifically affects users of Acceptor::accept
as they follow this code path, while other APIs like TlsAcceptor
use different processing methods.